Create and use competition-based learning in cybersecurity
The module aims to build the required skills for students to be creators of practical cybsersecurity contests and use competition-based learning in their educator role. Students will learn how to design, implement, deploy and grade challenges as part of cybsersecurity contests (e.g. CTF – Capture the Flag).
Module Information
In this module, students will learn how to design, implement, deploy and grade challenges as part of cybsersecurity contests (e.g. CTF – Capture the Flag). These are to be used as part of training and teaching activities that students will conduct themselves.
Key Details
This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.
The module aims to build the required skills for students to be creators of practical cybsersecurity contests and use competition-based learning in their educator role. Toward this goal, the module employs in-class participation and assignments.
Time commitment:
- Online activities: 14 hours
- In-person activities: 14 hours
- Self-learning: 28 hours
- Individual, team and guided projects and activities: 69 hours
- Total: 125 hours
Credit points: 5 ECTS
Grading:
- In-class Activity: 10%
- Assignments: 40%
- Exam: 50%
Subjects covered
Overview of cybersecurity practice activities: wargames, CTF contests & challenges, vulnerable boxes
Pedagogical Considerations Related to Practical Activities
Cybersecurity Practice Arsenal
CTF Cybersecurity Challenges
Deployment of CTF Challenges
CTF Engines – CTFd.io
Pedagogical Aspects of Contests and Competitions
Organizing and Deploying a CTF Contest
Using Virtual Machines
Designing a Vulnerable Box Challenge
Deploying Vulnerable Boxes
Assessment of Results of Cybersecurity Practice Activities
Apply nowLearning objectives
Recognize common patterns in cybersecurity attack and defense activities that can be replicated and integrated in cybersecurity exercises
Develop, employ and asses practical cybersecurity exercises, both as single-topic challenges and as vulnerable boxes that feature a complex interconnected topics closer to a real-world setup
Combine patterns from existing cybersecurity exercises intor new customized deployments
Assess student practical cybsersecurity knowledge and skills and revise exercises according to their current level
Design and set up cyber range-environments and CTF (Capture the Flag)-like contests, including setting up the platform, selecting challenges, grading, providing support
Summarize and interpret results and feedback of practice activities
Apply nowModule leaders
Răzvan is an Associate Professor at POLITEHNICA Bucharest, the Computer Science and Engineering Department. He is primarily interested in operating systems and security, with a penchant for teaching and mentoring.
Răzvan is leading community activities in POLITEHNICA, centered around cybersecurity and open source. He has led the Security Summer School, a yearly 5-week summer school that has been running for 12 years and has generated over 500 graduates in cybersecurity. He is involved in mentoring students in cybersecurity topics and organizing and supporting local and national CTF contents. On the open source side, Răzvan is lead the ROSEdu (Romanian Open Source Education) association, organizing extracurricular classes and projects dealing with open source and by supporting students to take part in Google Summer of Code.
Răzvan’s research focus is on systems and software security, particularly Apple iOS security, cyber-reasoning systems and the Unikraft unikernel in recent years.
Apply nowMaking Europe cyber-aware
Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.
Download prospectus