Proceedings of the 5th Conference on Information Technology Education 2004
DOI: 10.1145/1029533.1029576
|View full text |Cite
|
Sign up to set email alerts
|

Experiential learning and security lab design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…In answering this, one must keep in mind that the best learning method for cryptography as presented in [2] is "experiential learning and security lab design" [3]. Kolb's learning model [4] details the four modes of learning that need to be examined:…”
Section: Cryptography Experiential Learningmentioning
confidence: 99%
“…In answering this, one must keep in mind that the best learning method for cryptography as presented in [2] is "experiential learning and security lab design" [3]. Kolb's learning model [4] details the four modes of learning that need to be examined:…”
Section: Cryptography Experiential Learningmentioning
confidence: 99%
“…Hands-on and remote laboratories involve students, provide them with real data and realistic situations to face. Experimentations on such systems reported very positive results both in terms of students' satisfaction and perceived learning [18,12,19,29]. One further benefit is that students acquire proficiency in dealing with open source tools actually used in real contexts [8].…”
Section: Related Workmentioning
confidence: 99%
“…Crowley [5] recommends using Kolb's model for experiential learning [20] to create hands-on labs for an IT Security course. Experiential learning is essential in non-technical subjects as well.…”
Section: Adapting To the Othermentioning
confidence: 99%