<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-7467</journal-id>
<journal-title><![CDATA[RIDE. Revista Iberoamericana para la Investigación y el Desarrollo Educativo]]></journal-title>
<abbrev-journal-title><![CDATA[RIDE. Rev. Iberoam. Investig. Desarro. Educ]]></abbrev-journal-title>
<issn>2007-7467</issn>
<publisher>
<publisher-name><![CDATA[Centro de Estudios e Investigaciones para el Desarrollo Docente A.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-74672024000200712</article-id>
<article-id pub-id-type="doi">10.23913/ride.v15i29.2052</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[EthkLab: laboratorio de bajo costo para aprendizaje práctico en temas de ciberseguridad]]></article-title>
<article-title xml:lang="en"><![CDATA[EthkLab: Low-cost laboratory for hands-on learning in cybersecurity issues]]></article-title>
<article-title xml:lang="pt"><![CDATA[EthkLab: laboratório de baixo custo para aprendizagem prática em temas de segurança cibernética]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Martínez-García]]></surname>
<given-names><![CDATA[Holzen Atocha]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Camacho-Pérez]]></surname>
<given-names><![CDATA[Enrique]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chuc-Us]]></surname>
<given-names><![CDATA[Ligia Beatriz]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico Superior Progreso ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Yucatán  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico Superior Progreso ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>15</volume>
<numero>29</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-74672024000200712&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-74672024000200712&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-74672024000200712&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En este artículo se presenta EthkLab, un laboratorio portátil y de bajo costo para el aprendizaje en ciberseguridad y hacking ético. El objetivo fue desarrollar un entorno de aprendizaje para estudiantes del Tecnológico Nacional de México, campus Progreso, los cuales carecen de un laboratorio especializado en ciberseguridad. Para eso, en primer lugar, se evalúa la viabilidad de la construcción de dicho laboratorio y, posteriormente, se diseña la arquitectura específica de hardware y se desarrolla el prototipo. Para validar el laboratorio se efectuaron diversas pruebas con estudiantes voluntarios, las cuales arrojaron resultados satisfactorios que respaldan la hipótesis de que puede ser empleado en beneficio de los estudiantes y potenciar el desarrollo de sus habilidades mediante pruebas prácticas realistas. Sin embargo, como en todo desarrollo preliminar, se identificaron áreas de oportunidad que deberán ser evaluadas y mejoradas en futuros trabajos sobre esta arquitectura propuesta, la cual es escalable tanto vertical como horizontalmente debido a la naturaleza de su diseño.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract EthkLab, a low-cost portable laboratory for learning cybersecurity and ethical hacking, is presented. The objective was to develop a learning environment for students at the Tecnológico Nacional de México campus Progreso, who lack a specialized laboratory about cybersecurity. First, it is defined whether it is possible and feasible to build such a laboratory. Then the specific hardware architecture is designed and the prototype is developed. Various tests are applied to volunteer students for validation of the lab, revealing satisfactory results that support the hypothesis that it can be used to benefit students and improve their skills with realistic hands-on testing. As in any preliminary development, areas of opportunity were found to be evaluated and corrected in future work on this proposed architecture, which is vertically and horizontally scalable due to the nature of its design.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Este artigo apresenta o EthkLab, um laboratório portátil e de baixo custo para aprendizagem em segurança cibernética e hacking ético. O objetivo foi desenvolver um ambiente de aprendizagem para alunos do Tecnológico Nacional de México, campus Progreso, que carecem de um laboratório especializado em segurança cibernética. Para isso, primeiro avalia-se a viabilidade de construção do referido laboratório e, posteriormente, projeta-se a arquitetura de hardware específica e desenvolve-se o protótipo. Para validar o laboratório, foram realizados diversos testes com alunos voluntários, que produziram resultados satisfatórios que sustentam a hipótese de que o mesmo pode ser utilizado em benefício dos alunos e potenciar o desenvolvimento das suas competências através de testes práticos realistas. No entanto, como em todo o desenvolvimento preliminar, foram identificadas áreas de oportunidade que devem ser avaliadas e melhoradas em trabalhos futuros nesta arquitectura proposta, que é escalável tanto vertical como horizontalmente devido à natureza do seu design.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[aprendizaje práctico]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[entorno de aprendizaje]]></kwd>
<kwd lng="es"><![CDATA[laboratorio portátil]]></kwd>
<kwd lng="en"><![CDATA[Learning environment]]></kwd>
<kwd lng="en"><![CDATA[Cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[Hands-on learning]]></kwd>
<kwd lng="en"><![CDATA[Portable lab]]></kwd>
<kwd lng="pt"><![CDATA[aprendizagem prática]]></kwd>
<kwd lng="pt"><![CDATA[segurança cibernética]]></kwd>
<kwd lng="pt"><![CDATA[ambiente de aprendizagem]]></kwd>
<kwd lng="pt"><![CDATA[laboratório portátil]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arreola-García]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Desafíos a las estrategias de ciberseguridad en América]]></article-title>
<source><![CDATA[Revista del Centro de Estudios Superiores Navales]]></source>
<year>2019</year>
<volume>40</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>25-53</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castro-León]]></surname>
<given-names><![CDATA[G. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Rendón-Burgos]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Creación de un entorno virtual de aprendizaje para un laboratorio de enseñanza de seguridad informática en carreras técnicas]]></source>
<year>2021</year>
<publisher-name><![CDATA[Universidad de Guayaquil]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuentes-Penna]]></surname>
<given-names><![CDATA[A. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez-Cárdenas]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[González-Ibarra]]></surname>
<given-names><![CDATA[J. de D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La Ciberseguridad en México y los derechos humanos en la era digital]]></article-title>
<source><![CDATA[Espacios Públicos]]></source>
<year>2023</year>
<volume>24</volume>
<numero>61</numero>
<issue>61</issue>
<page-range>110-30</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grobler]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaire]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nepal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[User, Usage and Usability: Redefining Human Centric Cyber Security]]></article-title>
<source><![CDATA[Frontiers in Big Data]]></source>
<year>2021</year>
<volume>4</volume>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Legg]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mills]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range]]></article-title>
<source><![CDATA[Journal of The Colloquium for Information Systems Security Education]]></source>
<year>2023</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marble]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lawless]]></surname>
<given-names><![CDATA[W. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Mittu]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Coyne]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Abramson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sibley]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Human Factor in Cybersecurity: Robust &amp; Intelligent Defense]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Jajodia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shakarian]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Subrahmanian]]></surname>
<given-names><![CDATA[V. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Swarup]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Warfare: Building the Scientific Foundation]]></source>
<year>2015</year>
<page-range>173-206</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez-Luengo]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anonimato y Pentesting con Raspberry Pi]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñoz-Martínez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Políticas educativas e incorporación de las TIC en la educación superior mexicana]]></article-title>
<source><![CDATA[Revista Digital Universitaria]]></source>
<year>2020</year>
<volume>21</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oh]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Stickney]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hawthorne]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Matthews]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Teaching Web-Attacks on a Raspberry Pi Cyber Range]]></source>
<year>2020</year>
<conf-name><![CDATA[ Proceedings of the 21st Annual Conference on Information Technology Education]]></conf-name>
<conf-loc> </conf-loc>
<page-range>324-9</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pearson]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Crain]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Casaca]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Katkoori]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ray]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Strous]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet of Things. A Confluence of Many Disciplines]]></source>
<year>2020</year>
<page-range>289-306</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<collab>Raspberry Pi Ltd</collab>
<source><![CDATA[Buy a Raspberry Pi 400 Personal Computer Kit. Raspberry Pi]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salazar-Mata]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz-Navarro]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Balderas-Sánchez]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz-Uribe]]></surname>
<given-names><![CDATA[H. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad informática en las instituciones de educación superior]]></article-title>
<source><![CDATA[TECTZAPIC: Revista Académico-Científica]]></source>
<year>2021</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>72-9</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres-Knight]]></surname>
<given-names><![CDATA[R. R. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Méndez-Morales]]></surname>
<given-names><![CDATA[O. A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Esfuerzo dentro del estado de Chihuahua, México en materia de ciberseguridad. Informática y Derecho]]></article-title>
<source><![CDATA[Revista Iberoamericana de Derecho Informático]]></source>
<year>2023</year>
<volume>13</volume>
<numero>2.ª época</numero>
<issue>2.ª época</issue>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Velasco-Arellanes]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vera-Noriega]]></surname>
<given-names><![CDATA[J. Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Durazo-Salas]]></surname>
<given-names><![CDATA[F. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La educación universitaria pública mexicana en el libre mercado: necesidades, ausencias y confusiones en su mejoramiento]]></article-title>
<source><![CDATA[Voces y Silencios. Revista Latinoamericana de Educación]]></source>
<year>2020</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yamin]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Katt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Gkioulos]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber ranges and security testbeds: Scenarios, functions, tools and architecture]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>88</volume>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zimmermann]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Renaud]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Moving from a &#8216;human-as-problem&#8221; to a &#8216;human-as-solution&#8221; cybersecurity mindset]]></article-title>
<source><![CDATA[International Journal of Human-Computer Studies]]></source>
<year>2019</year>
<volume>131</volume>
<page-range>169-87</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
