Return to Article Details Fundamental principles for the design and application of cyber ranges for training cybersecurity specialists Download Download PDF