With the escalating frequency and sophistication of cyberattacks on companies and government agencies, the demand for hands-on cybersecurity training has never been more critical. Such training requires a dedicated platform and infrastructure. In this context, Cyber Ranges have emerged as platforms to address these needs. This article systematically evaluates the current state of cybersecurity training in Cyber Ranges, with a focus on the technology stack, training features, and automation capabilities. Various dimensions are used to assess accessibility, such as access to the platform, training content, supervised training, the deployment model, or the ease of onboarding. Mapping specific Cyber Range features to these categories, we developed the Cyber Range feature ontology, which can be used to evaluate Cyber Ranges according to existing best practices, technical trends and lessons learned from current research. By combining a systematic literature review with the results of a subsequent survey, this study closes existing knowledge gaps on current Cyber Ranges and provides actionable insights for researchers and practitioners. Thereby, we also developed a web-based filtering tool that is hosted on a website to make the results even more accessible to the public. This comprehensive analysis provides insights into the current state of cybersecurity training via Cyber Ranges, facilitating an understanding of the challenges and opportunities in this rapidly evolving field. The results reveal which technologies are currently employed in Cyber Ranges, but also which groups can be trained on which topics. Furthermore, key trends and emerging themes in the field are identified.
«
With the escalating frequency and sophistication of cyberattacks on companies and government agencies, the demand for hands-on cybersecurity training has never been more critical. Such training requires a dedicated platform and infrastructure. In this context, Cyber Ranges have emerged as platforms to address these needs. This article systematically evaluates the current state of cybersecurity training in Cyber Ranges, with a focus on the technology stack, training features, and automation capab...
»