“…Throughout this section, we refer to Table 1 and Table 2, which summarize the results. Burket, Chapman, Becker, Ganas, and Brumley (2015) offense detect cheating in a CTF by analyzing sharing of solutions P7 Weiss, Locasto, and Mache (2016) offense assess learners by visualizing their command history as a directed graph P9 Vykopal and Barták (2016) offense determine what information can be predicted from logs of 260 trainees P11 Tseng et al (2017) offense analyze learners' behavior in a CTF to reveal their misconceptions P12 Caliskan, Tatar, Bahsi, Ottis, and Vaarandi (2017) offense determine metrics from exercise logs that will predict students' grade P14 Andreatos (2017) offense analyze students' network activity in a lab to review their actions P16 Kont, Pihelgas, Maennel, Blumbergs, and Lepik (2017) offense provide and evaluate feedback for the attacking teams in a CDX P18 Chothia, Holdcroft, Radu, and Thomas (2017) offense determine if storyline in a cybersecurity training improves learning P19 Tian et al (2018) offense provide trainees with situational awareness of the training P21 Švábenský and Vykopal (2018a) offense determine if trainees fulfill prerequisites of security training P22 Švábenský and Vykopal (2018b) offense analyze how trainees interact with security training tasks and tools P25 Andreolini, Colacino, Colajanni, and Marchetti (2019) offense assess trainees by comparing their actions to a reference solution P26 Falah, Pan, and Chen (2019) offense estimate the difficulty of attacks and measure skills of trainees P28 Maennel, Mäses, Sütterlin, Ernits, and Maennel (2019) offense, network security assess students who apply to a cybersecurity master degree program P31 offense, forensics, network security compare assessment of students who did / did not participate in a CTF P34 Kaneko et al (2020) offense, forensics evaluate an intensive cybersecurity course based on student performance P35 Yett et al (2020) offense, secure programming analyze how students collaborate in group programming tasks P2 Reed, Nauer, and Silva (2013) forensics analyze score distribution, submission delay, and frustration in a CTF P6 Abbott et al (2015) forensics quantitatively analyze student actions and performance in security training P1 Rupp et al (2012) network security identify skill profiles of students based on logs and submitted commands P23 Zeng, Deng, Hsiao, Huang, and Chung (2018) network security compare student grades with the time they spent working on lab tasks P24 Deng, Lu, Chung, Huang, and network security adapt instruction to...…”