ENHANCING CYBERSECURITY EDUCATION THROUGH HANDS-ON CRYPTOGRAPHY AND NETWORK PROTECTION LABS
1 Trakia University (BULGARIA)
2 SRH University, School of Technology and Architecture (GERMANY)
About this paper:
Conference name: 17th International Conference on Education and New Learning Technologies
Dates: 30 June-2 July, 2025
Location: Palma, Spain
Abstract:
As cyber threats grow in sophistication, traditional lecture-based methods in cybersecurity education often fail to equip students with the practical skills needed to defend real-world systems. This paper presents an experiential learning framework that enhances comprehension of cryptography and network protection through structured, hands-on labs. Our approach integrates five key practical exercises:
(1) Email encryption using GPG4Win (Kleopatra) to teach public-key infrastructure (PKI) and secure communication;
(2) Steganography via OpenPuff to explore data hiding techniques;
(3) WPA2 penetration testing to demonstrate Wi-Fi vulnerabilities and ethical hacking principles;
(4) VPN server/client setup to illustrate secure remote access and tunneling protocols; and
(5) Network scanning and traffic analysis using Angry IP Scanner and Wireshark for intrusion detection and forensic investigation.
To assess the effectiveness of this approach, we conducted a mixed-methods study involving pre- and post-lab assessments, student surveys, and controlled skill-based evaluations. Results indicate a statistically significant improvement in students’ ability to apply cryptographic concepts, identify attack vectors, and implement defensive measures compared to a control group taught via traditional methods. Qualitative feedback highlights increased engagement, problem-solving confidence, and awareness of ethical hacking responsibilities.
The study underscores the critical role of hands-on training in cybersecurity curricula, particularly in preparing graduates for industry certifications (e.g., CEH, Security+) and real-world threat mitigation. We also discuss scalability challenges, including lab resource requirements and instructor training, proposing modular adaptations for diverse educational settings.Keywords:
Cybersecurity education, Hands-on learning, Cryptography, GPG4Win, Steganography, WPA2 Penetration, VPN, Network forensics, Ethical hacking.