Journal of Technology and Information Education 2025, 17(1):58-77 | DOI: 10.5507/jtie.2025.009

CURRENT STATE AND FUTURE DIRECTIONS OF CYBERSECURITY EDUCATION IN CZECHIA

Willi LAZAROV
Vysoké učení technické v Brně, Česká republika

The need to educate users in cybersecurity to some extent is critical given the ever-increasing number of cyber threats. However, the approach to education cannot be easily generalized due to the different environments, technical expertise, and age groups of users. Cybersecurity, as a distinct domain within the ICT field, involves challenging disciplines that are largely technical, and therefore it is important to include hands-on learning in the education process. The field has evolved considerably over the last 10 years, including different approaches and options for its study at higher and secondary levels of education. This article focuses on this domain in the context of the Czech environment. First, the historical development and current state of cybersecurity education is presented, highlighting the increase in the number of study programs in the countries of the European Union. Subsequently, the conducted analysis is presented, focusing more closely on the Czech education system from the higher to the primary level of education. It shows that 6 universities offer accredited study programs with a primary focus on cybersecurity. The analysis also examined the coverage of cybersecurity education at the secondary level, where 41 secondary schools (31.3%) offer at least one separate course in cybersecurity, and 18 of these schools also offer a study subfield or specialization. Considering the need for hands-on learning, the article also presents tools and methods that can be integrated to create a controlled, safe, and interactive learning environment. In this aspect, the article discusses in detail the use of local virtualization, the concept of sandboxing, cyber range platforms, and gamification techniques to increase student engagement. These methods and tools were subsequently applied and tested in the lessons by university, high school, and grammar school students. From the feedback received from the test groups, the combination of interactive and gamified methods appears to be suitable for supporting cybersecurity education.

Keywords: cybersecurity, hands-on learning, educational platforms, interactivity, gamification, virtualization.

Received: March 3, 2025; Revised: September 14, 2025; Accepted: March 3, 2025; Published: October 17, 2025  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
LAZAROV, W. (2025). CURRENT STATE AND FUTURE DIRECTIONS OF CYBERSECURITY EDUCATION IN CZECHIA. Journal of Technology and Information Education17(1), 58-77. doi: 10.5507/jtie.2025.009
Download citation

References

  1. ASKI (2024). MBA v oblasti kybernetické bezpečnosti v České republice a Slovensku. Asociace škol kritické infrastruktury. Dostupné z: https://mba.aski.cz/mba-studium-manazer-kyberneticke-bezpecnosti/
  2. Balon, T., & Baggili, I. (2023). Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Education and Information Technologies, 28(9), 11759-11791. https://doi.org/10.1007/s10639-022-11451-4 Go to original source...
  3. Beauchamp, C., Beach, V., & Matuscovich, V. H. (2023). Educational cyber ranges: A mixed-method study of significant learning experiences using cyber ranges for cybersecurity education. Cybersecurity Pedagogy & Practice Journal, 2(1), 4-11.
  4. Bioglio, L., Capecchi, S., Peiretti, F., Sayed, D., Torasso, A., Pensa, R.G. (2019). A Social Network Simulation Game to Raise Awareness of Privacy Among School Children. IEEE Transactions on Learning Technologies, 12(4), 456-469. https://doi.org/10.1109/ TLT.2018.2881193 Go to original source...
  5. Catota, F. E., Morgan, M. G., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1), 1-19. https://doi.org/10.1093/cybsec/tyz001Chvalkovská, P. V ČR startuje středoškolské studium kybernetické bezpečnosti. KYBEZ. Dostupné z: https://kybez.cz/v-cr-startuje-stredoskolske-studium-kyberneticke-bezpecnosti/ Go to original source...
  6. CTFd (2024). The Easiest Capture the Flag Platform. CTFd. Dostupné z: https://ctfd.io/
  7. De Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7. https://doi.org/10.1016/j.giq.2017.02.007 Go to original source...
  8. E-Bezpečí (2024). Vzdělávejte se s E-Bezpečím. E-Bezpečí. Dostupné z: https://vzdel avani.e-bezpeci.cz/
  9. ENISA (2025). CYBERHEAD - Cybersecurity Higher Education Database. European Union Agency for Cybersecurity. Dostupné z: https://tools.enisa.europa.eu/topics/ education/cyberhead/
  10. FEKT (2024). Master of Science in Cybersecurity proCyber. FEKT VUT. Dostupné z: https://www.utko.fekt.vut.cz/master-science-cybersecurity-procyber
  11. Hack The Box (2025). The #1 Cybersecurity Performance Center. HTB. Dostupné z: https://www.hackthebox.com/
  12. Harris, G. (2024). How State Universities are addressing the Shortage of Cybersecurity Professionals in the United States. Journal of Cybersecurity Education, Research and Practice, 2024(1), 27. https://doi.org/10.62915/2472-2707.1194 Go to original source...
  13. Katsantonis, M. N., Manikas, A., Mavridis, I., & Gritzalis, D. (2023). Cyber range design framework for cyber security education and training. International Journal of Information Security, 22(4), 1005-1027. https://doi.org/10.1007/s10207-023-00680-4 Go to original source...
  14. Kucek, S., & Leitner, M. (2020). An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments. Journal of Network and Computer Applications, 151, 102470. https://doi.org/10.1016/j.jnca.2019.102470 Go to original source...
  15. Kumar, P., Vitak, J., Chetty, M., Clegg, T.L., Yang, J., McNally, B., Bonsignore, E. (2018). Co-designing online privacy-related games and stories with children. Proceedings of the 17th ACM Conference on Interaction Design and Children (s. 67-79). Trondheim Norway: ACM. https://doi.org/10.1145/3202185.3202735 Go to original source...
  16. Lazarov, W., Stodulka, T., Schafeitel-Tähtinen, T., Helenius, M., & Martinasek, Z. (2023). Interactive Environment for Effective Cybersecurity Teaching and Learning. Proceedings of the 18th International Conference on Availability, Reliability and Security (s. 1-9). https://doi.org/10.1145/3600160.3605007 Go to original source...
  17. Lazarov, W., Schafeitel-Tähtinen, T., Squillace, J., Martinasek, Z., Coufalikova, A., Helenius, M., Gallus, P. & Fujdiak, R. (2025). Lessons Learned from Using Cyber Range to Teach Cybersecurity at Different Levels of Education. Technology, Knowledge and Learning, 1-36. https://doi.org/10.1007/s10758-025-09840-ys Go to original source...
  18. McDaniel, L., Talvi, E., & Hay, B. (2016). Capture the Flag as Cyber Security Introduction. 2016 49th Hawaii International Conference on System Sciences (HICSS) (s. 5479-5486). https://doi.org/10.1109/HICSS.2016.677 Go to original source...
  19. Mouheb, D., Abbas, S., & Merabti, M. (2019). Cybersecurity curriculum design: A survey. Transactions on Edutainment XV, 93-107. https://doi.org/10.1007/978-3-662-59351-6_9 Go to original source...
  20. Mountrouidou, X., Vosen, D., Kari, C., Azhar, M. Q., Bhatia, S., Gagne, G., Maguire, J., Tudor, L., Yuen, T. T. (2019). Securing the human: A review of literature on broadening diversity in cybersecurity education. Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education (s. 157-176). New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3344429.3372507 Go to original source...
  21. MŠMT (2022). Registr vysokých škol a uskutečňovaných studijních programů. Ministerstvo školství, mládeže a tělovýchovy. Dostupné z: https://regvssp.msmt.cz/
  22. MŠMT (2025). Rejstřík škol a školských zařízení. eEdu portál. Dostupné z: https://regvssp.msmt.cz/
  23. MUNI (2001). Studijní katalog Fakulty informatiky v akademickém roce 2001/2002. FI MU. Dostupné z: https://www.fi.muni.cz/docs/sez01-02.pdf
  24. NÚKIB (2024). Vzdělávací portál NÚKIB. Národní úřad pro kybernetickou a informační bezpečnost. Dostupné z: https://osveta.nukib.gov.cz/
  25. Quayyum, F., Cruzes, D. S., Jaccheri, L. (2021). Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction, 30, 100343. https://doi.org/10.1016/j.ijcci.2021.100343 Go to original source...
  26. RingZer0 (2024). RingZer0 Team Online CTF. RingZer0 Team Online CTF. Dostupné z: https://ringzer0ctf.com/
  27. Stodůlka, T., & Fujdiak, R. (2022). Budování Cyber Range platformy s technologií cloud computingu. Vysoké učení technické v Brně.
  28. TryHackMe (2025). Learn Cyber Security. THM. Dostupné z: https://tryhackme.com/ hacktivities
  29. Tzavara, V., & Vassiliadis, S. (2024). Tracing the evolution of cyber resilience: a historical and conceptual review. International Journal of Information Security, 23(3), 1695-1719. https://doi.org/10.1007/s10207-023-00811-x Go to original source...
  30. UTB (2024). Kybernetická bezpečnost. Univerzita Tomáše Bati ve Zlíně. Dostupné z: https://www.utb.cz/vyhledavac-oboru/informacni-technologie-mgr/kyberneticka-bezpecn ost-mgr/
  31. Vanderhoven, E., Willems, B., Hove, S. V., All, A. (2015). Wait and see? Studying the Teacher's Role During In-Class Educational Gaming. Proceedings of the European Conference on Games-Based Learning (s. 540-547).
  32. VUT (2015). Informační bezpečnost. Vysoké učení technické v Brně. Dostupné z: https://www.vut.cz/studenti/programy/obor/10687
  33. VUT (2024). Informační technologie a umělá inteligence. Vysoké učení technické v Brně. Dostupné z: https://www.vut.cz/studenti/programy/program/8967
  34. Vykopal, J., Švábenský, V., & Chang, E. C. (2020). Benefits and Pitfalls of Using Capture the Flag Games in University Courses. Proceedings of the 51st ACM Technical Symposium on Computer Science Education (s. 752-758). https://doi.org/10.1145/ 3328778.3366893 Go to original source...
  35. Wright, A. C. (2017). Orange is the new purple. USA: BlackHat. Dostupné z: https://www.blackhat.com/docs/us-17/wednesday/us-17-Wright-Orange-Is-The-New-Pur ple-wp.pdf
  36. Yamin, M. M., Katt, B., & Gkioulos, V. (2020). Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security, 88, 101636. https://doi.org/10.1016/j.cose.2019.101636 Go to original source...