How can we create a reusable learning environment to educate cybersecurity trainees in an interactive, entertaining, and realistic manner about the procedures and techniques used to attack & defend critical network infrastructure and the aftermath thereof?