zyBooks Guide to Bridging the Gap in Cybersecurity Education: From Technical Skills to Real-World Readiness

Avatar photo Dr. Babak Shoraka

As cybersecurity education advances, applied learning experiences are increasingly recognized as essential for preparing learners to apply their skills in practice and achieve workforce readiness. Foundational knowledge and theoretical instruction remain critical, but interactive components provide the bridge between “knowing” and “doing”. Too often, however, these activities remain fragmented and disconnected from the operational realities where true expertise is developed.

The Introduction to Security zyBook addresses this gap by unifying labs, case studies, and scenario lab challenges into an immersive sequence that connects technical skill-building with the judgment, critical thinking, and problem-solving abilities learners will need as future professionals.

Where traditional approaches fall short: “How” instead of “why” and “when”

In cybersecurity education, labs often focus on isolated skills—configuring a firewall, scanning a network, managing user permissions—without demonstrating their significance in identifying, preventing, or mitigating major security incidents. This fragmentation leaves learners knowing the “how,” but missing the crucial “why” and “when.”

From skills to security readiness: Walkthrough labs to Case studies to Scenario labs

The zyBooks approach combines three integrated components—hands-on VM-based walkthrough labs, case studies anchored to real cyber incidents, and scenario labs—to connect technical mastery with the decision-making and situational awareness required in cybersecurity practice.


How the zyBooks integrated approach works:


Walkthrough labs: Building the technical backbone

The VM-based walkthrough labs provide a controlled, virtualized environment where learners execute industry-relevant tasks using step-by-step instructions. 

These guided labs build core proficiency with essential tools and techniques, giving learners the practical foundation needed for advanced case studies and scenario labs. Whether creating cryptographic key pairs to support secure communication, deploying Active Directory group policies to enforce secure account governance, or configuring a RAID array to strengthen data resilience, these labs go beyond theory and require learners to execute the tasks a security professional would perform in production environments.

Case studies: Developing situational awareness

The case studies ground technical exercises in reality by demonstrating how weaknesses in security architecture, configuration, or monitoring led to compromise in high-profile incidents. 

Each study maps those failures to specific adversary tactics, techniques, and procedures (TTPs), transforming technical lessons into actionable insights. Building on the skills developed in the walkthrough labs, learners analyze how attackers enumerated networks, exploited misconfigurations, or leveraged persistence mechanisms in cases like WannaCry ransomware or SolarWinds supply chain attack. By examining these incidents, learners gain the ability to recognize attack patterns, anticipate adversary moves, and draw lessons that shape more informed security practices.

Case studies push students to move beyond memorization or simple problem-solving and engage with material in a more thoughtful and analytical way, ultimately improving their critical thinking abilities.
– Salman Niksefat, Instructor, Willis College


Scenario labs: Practicing independent problem-solving

The scenario labs complete the learning cycle by placing learners in authentic operational challenges. 

Learners must design solutions, troubleshoot under constraints, and make configuration choices without prompts—much like in an actual security role. Building on skills mastered in the walkthrough labs and insights gained from case studies, learners are tasked, for instance, with securing a corporate network by identifying and correcting firewall misconfigurations, blocking insecure protocols, and enabling only essential services to balance security with operational continuity. As learners navigate these open-ended scenarios, they develop the adaptability and judgment needed to make sound decisions under uncertainty.

Why integrated cybersecurity labs are rare

Integrating guided technical walkthroughs, real-world case study analysis, and open-ended scenario lab challenges within a single cohesive framework is virtually nonexistent in cybersecurity education. Most instructional approaches present labs as siloed modules or disconnected exercises, leaving learners without a sense of how tasks relate to actual threats or attack scenarios. 

Case studies, if included, are often optional and based on hypothetical or simplified scenarios rather than deep analyses of actual incidents—limiting the development of true analytical skills. Scenario-based labs are even less common, as designing and supporting open-ended challenges that capture the complexity and uncertainty of modern security operations requires both expertise and dedicated infrastructure.

Without true integration, learners often acquire isolated technical skills and struggle to relate them to real-world threats and strategic decision-making. By contrast, an integrated framework develops applied judgment, contextual understanding, and professional readiness—while also reinforcing the knowledge and competencies validated by industry certifications.

What learners gain from true integration

When technical walkthroughs, case studies, and scenario labs are unified, like in zyBooks, learners benefit from instruction that reflects the complexity and demands of current cybersecurity practice. This layered framework guides learners from foundational skill development to contextual understanding and, ultimately, to independent problem-solving.

Through the structured progression from guided tasks to real incident analysis and open-ended scenario labs, learners develop situational awareness, sound judgment, and critical thinking. They gain the confidence to assess unfamiliar situations, solve problems independently, and respond to evolving adversary tactics. They become not only technically skilled but workforce ready, prepared for the urgency and unpredictability of emerging security challenges—raising the benchmark for applied cybersecurity education.


Avatar photo
Author Bio

Dr. Babak Shoraka

Dr. Babak Shoraka has taught cybersecurity courses for over a decade at Northeastern University, Colorado State University, and the University of Maryland. He has over twenty years of experience in computer and information technologies spanning diverse industries, including telecommunications, research, banking, and finance. Prior to joining zyBooks, he worked as an information security analyst, software developer, and systems engineer at numerous multinational corporations in Tokyo, London, and New York.