technical readiness and knowledge retention
(Chouliaras et al., 2021; Glas et al., 2023; Yamin &
Katt, 2022). Gamified instructional models have also
demonstrated potential in fostering learner
motivation and sustained engagement (Papastergiou,
2009). Yet, these advancements have rarely been
systematically applied to dark web investigation
training or integrated into scalable, digitally
facilitated learning platforms.
This paper presents the design and development
of a hands-on cyber drill training lab, implemented on
the TryHackMe platform to deliver structured and
interactive learning experiences for dark web
investigation. The training content is based on a
standardized national cybersecurity curriculum and
emphasizes three core modules: Dark Web
Fundamentals, Hands-On Dark Web Analysis, and
Dark Web Investigation. The development process
follows the ADDIE instructional design model
(Branch, 2010). Effectiveness is evaluated through
User Acceptance Testing (UAT) (Leung & Wong,
1997) and a pretest–posttest design with paired t-test
(Ross & Willson, 2017) analysis to assess cognitive
improvement. The resulting training module aims to
support sustainable capacity building for stakeholders
with investigative mandates in cybercrime and digital
forensics.
2 METHODOLOGY
The research applied a Research and Development
(R&D) approach using the ADDIE instructional
design model: Analyze, Design, Develop, Implement,
and Evaluate (Branch, 2010). The design process
followed the five stages of the ADDIE model,
illustrated in Figure 1.
Figure 1: ADDIE Instructional Design Model Applied in
This Study.
2.1 Analyze
This phase began with validating the training
performance gap through interviews with two groups:
training organizers from a national cybersecurity
training institution and former training participants.
Three primary gaps were identified: (1) the absence
of a hands-on, practice-oriented training medium, (2)
the lack of structured guidance during practical
sessions, and (3) the unavailability of reusable
documentation to support independent learning.
These insights informed the instructional goals,
which aimed to deliver an accessible, structured, and
practically oriented training experience through a
digital platform.
Target participants were selected randomly
from a pool of eligible cybersecurity cadets using
Simple Random Sampling (SRS) (Makwana et al.,
2023). Thirty participants (21 male, 9 female, aged
20–25) were included. All were undergraduate cadets
enrolled in the Cyber Security Engineering program.
Baseline surveys revealed that 78% had only basic
cybersecurity exposure, and none had prior dark web
investigation training or direct ties with the authors,
minimizing potential bias. he participant profile was
considered relevant because similar demographic
groups are often the primary target for cybersecurity
training initiatives, as highlighted in recent
simulation-based training studies (Panakkadan et al.,
2025; Salem et al., 2024).
The required resources included participant-
owned computing devices, preconfigured virtual
machines, TryHackMe accounts, internet access, and
supporting case files. All instructional materials were
optimized for independent, cost-effective
deployment, with scalability ensured through GitHub
distribution. The training was delivered
asynchronously in a self-paced format, with optional
instructor support. Project planning was conducted
individually and dynamically adjusted, with
constraints, such as limitations on in-browser VM
deployment, mitigated through downloadable
alternatives.
2.2 Design
Based on the previous analysis, the training was
designed to systematically close the identified
learning gaps. All content was implemented on the
TryHackMe platform and organized into 21 tasks,
including four supporting tasks and 17 core learning
tasks across three modules: Dark Web Fundamentals,
Hands-on Dark Web Analysis, and Dark Web
Investigation. The sequence of tasks ensured a