"Three-Dimensional Integration" Network Security Technology Teaching Reform Path Based on CTF Competition
DOI: https://doi.org/10.62517/jhet.202515338
Author(s)
Xiaoli Yu, Gang Qiu*
Affiliation(s)
School of Information Engineering, Changji University, Changji, China
*Corresponding Author
Abstract
In response to the current issues in network security technology teaching, such as abstract content, weak practical components, monotonous teaching methods, limited instructional scenarios, and insufficient digital literacy among teachers, this study proposes a "three-dimensional integration" teaching reform approach based on CTF (Capture The Flag) competitions. At the curriculum system reconstruction level, a tiered and progressive course module of "basic theory—attack and defense training—comprehensive drills" is established, with CTF competition question types organically integrated into the curriculum. In terms of assessment innovation, a diversified evaluation system of "problem-solving competitions + attack and defense competitions + project development" is introduced, and CTF competition results are incorporated into course credit recognition standards. Regarding teaching model reform, a case-guided Outcome-Based Education (OBE) teaching approach is implemented, while simultaneously promoting the regular training mechanism of CTF campus clubs. Practice has shown that this model significantly enhances students' learning interest through "competition-driven learning" and effectively improves the actual teaching outcomes of the course.
Keywords
Network Security Technology Curriculum Reform; CTF Competition-Driven; Attack and Defense Confrontation Training; OBE Teaching Mode; Competition Credit Conversion
References
[1] Wu, H., Li, X. D., Cheng, X. K., et al. (2024). A survey on APT attack detection technologies. Telecom World, 31(02), 61-63.
[2] Turton, W. (2021, May 8). Colonial Pipeline halts operations after cyberattack. Bloomberg. https://www.bloomberg.com/news/articles/2021-05-08/colonial-pipeline-halts-operations-after-cyberattack.
[3] European Union Agency for network security technology. (2022). Cyber threats during the Russia-Ukraine war. https://www.enisa.europa.eu/publications/cyber-threats-russia-ukraine-war.
[4] Mandiant. (2023). APT activity targeting critical infrastructure in East Asia. https://www.mandiant.com/resources/reports/apt-east-asia
[5] Xiong, Q. C., Chen, G., Du, Q. P., et al. (2023). Exploration of practical teaching in cyber attack and defense based on cyber range platform. Journal of China Multimedia & Network Teaching, (02), 13-16.
[6] Ying Z, Leian L. Practice of Teaching Reform of Network Security Technology Course under the Background of Internet+. International Journal of Information and Education Technology, 2019, 9(5):370-37