 I apologize, I'm a little under the weather, just came from an extended weekend out at Disney World with my family, so quite a change of scenery here, but I'm going to try to blow through this in the seven minutes, like the gentleman before me, I could go on for 70 minutes about this. So I work at the Software Engineering Institute of Carnegie Mellon University, and I also work as an adjunct instructor there, so, again, I can be long-winded. Now, I want to talk about some successes we've had with Moodle, and the way that we're able to use it to help solve some of our training challenges. And at the Software Engineering Institute, if I can find the clicker here. Well, anyways, while we look for that. Okay. Just hit. Okay. So, in the spirit of, you know, legalese, I have a slide from our lawyer saying I can speak with you, but we are a fairly funded research and development center, an FFRDC, and an FFRDC is charged with solving some of our nation's most challenging problems. In the case of the Software Engineering Institute, cyber security problems are our expertise. And I'm on a team at the SEI that focuses on training for the cyber workforce. And the cyber workforce, you know, it's everybody involved in cyber. You know, it's cis admins through, like, forensic investigators, and they get training through academia, you know, through colleges and universities, vendor training, on-the-job training, and also there's, you know, free training out there on the web that people are able to do. One thing that we do at the SEI is we host our own LMS, custom LMS that we're actually going away from and replacing with Moodle. And so there's some organizational change that we've been pushing from the bottom up in order to get people to adopt Moodle in our organization. So we've been doing, like, recorded video lectures, quizzes, and cyber training labs on this LMS platform. And for these cyber training labs, we're deploying a handful of virtual machines for a student to, you know, get hands-on experience using different tools and techniques. And sometimes these training events can scale thousands of VMs, hundreds of participants in large-scale cyber exercises. And in a large-scale cyber exercise, there's different teams for the participants, the blue cell or the blue team, being the defenders that are trying to secure that network from the red cell who are the opposing forces trying to hack into that network. And then we have the white cell that manages the entire exercise, and they're the ones charged with tracking assessment. And so when we have these cyber training exercises, there's two main challenges that we face. One is realism. We try to virtualize as much as we can so that we have scalability and repeatability in the training exercises. And sometimes we can't virtualize everything that these teams are seeing out in the real world. The other challenge is assessment. So how can we actually gauge what the students are doing with these different GUI tools or command-line tools and determine which team did it better? Is it the number of times they ran a command before they ran it correctly? Is it the amount of time they spent before they solved a particular challenge? And so I had Moodle in my previous work role before I came to Carnegie Mellon, and I said, well, Moodle has this great, robust quiz engine where we can get all kinds of metrics, and we can give quizzes to these students and these teams and track their performance through multiple iterations of an exercise. And then we went to Mountain Moot last year, and we learned about H5P with the interactive video content where we can take those boring recorded lectures and we can pause them and insert questions right there into the videos and help keep those students engaged. And then the other thing is with the cyber workforce, they need to know how to write programs. They need to understand scripting languages and programming languages. And we wanted to find an automated way to grade programming assignments because it's pretty hard to do that. And with Moodle, we found the virtual programming lab activity, and it's designed to execute a student's code inside a jail, but we didn't want the students to execute their code inside a jail. We wanted it to run on the actual virtual machines with the full operating system that they're trying to secure or, in some cases, attack. And so we modified the execution path inside our virtual programming labs so that the students' code ran exactly where they tested it out in their particular lab. And then another thing with Moodle and H5P is the ability to leverage the Experience API, XAPI. And this helps us track metrics, and hopefully we can take a look at the logs from the quizzes and also command line activity that the students are doing. We've generated something to create XAPI statements, telling us the user executed this command on this system, going with the XAPI Active Verb Object Construct. And we're feeding that into one of our engineers who's out here in the audience, Brandon Wolfe, has coined the Melk Stack. It stands for Moodle, Elastic Search, Log Stash, Learning Locker, and Kibana. Now, those are tools that are largely used in the cyber workforce for visualizing security events, you know, network flow data and intrusion logs from hosts. And so we're trying to blend together those sorts of metrics with the XAPI statements from, you know, Moodle and H5P and see where we can correlate some of those assessment challenges. And with Moodle, plugins and the OAuth support that came, I believe, with Moodle 3.5 has really been helping us gain ground in our organization adopting Moodle, because we're able to integrate it with our other products. We wrote a boost-based theme so that we could get rid of the, oh, well, I really like the way it looks aspect of it, and they get blended with our other tools. And we also wrote a plugin that would allow us to import the content from our custom LMS into Moodle. So that really helps facilitate a transition for us. And with OAuth, we also now want to take it a step further and use the system account that's in there to integrate with more of our cyber range tools so that we can begin to deploy virtual machines from a new Moodle activity we're working on creating. And then we can display the virtual machine consoles right inside a Moodle activity. And so this screenshot here is something we do have implemented right now with one of our tools. But I want to take it full circle and get those metrics from the VMs back up into a Moodle activity where we can have a lab task right there above the VM console that says, you know, create this config file. And that feedback loop would be in there. The activity would see that the student actually accomplished that task inside the cyber lab, and it would automatically advance to the next objective in their assignment. And so Moodle, you know, with its flexibility, is letting us do all of this fun stuff. And we're really excited to be able to leverage it and to talk about it. And if anybody wants to come talk with me or Brandon later, we'd be happy to talk to you in an hour about any one of these things. Thank you. Just while you're thinking whether you've got a question for Adam, can I just say that he had his slides working automatically every 20 seconds. And as someone who's presented an Ignite talk in that fashion, it is terrifying. So well done for doing that in an automatic fashion. Does anyone have a question? Just raise your hand if you've got a question for Adam. This gentleman over here, if you could wait for the microphone. Thank you. Thank you. So with what you've done, have you been able to drive all the way down into, say, memory forensics analysis, all the way into the steps of that to get, like, a flow? So if a student completes the course, you see the flow, you capture that. When they complete it the next time, you can measure maybe the speed to perform that type of function. Yeah, we're not there yet. This is, like, really in its infancy that we're starting to gather these metrics. But that's exactly, like, the direction we want to go with it. We'll need more than an hour then. Any more questions for Adam? No? Well, thank you very much.