“…Over the past few years, hands on exercises using VMs have been tried successfully in courses related to information, web or computational security (Tao, Chen & Lin, 2010;Gephart & Kuperman, 2010;Hay, Dodge & Nance, 2008;Hickman, 2008;Bullers, Burd & Seazzu, 2006;Adams & Laverell, 2005), operating systems (Nieh & Vaill, 2005;Adams & Laverell, 2005), Windows and Linux system administration (Hickman, 2008;Stackpole et al, 2008), database (Cranitch & Rees, 2009), computer forensics (Hickman, 2008;Bullers, Burd & Seazzu, 2006), data communications (Hickman, 2008) and networking (Stackpole et al, 2008;Bullers, Burd & Seazzu, 2006;Adams & Laverell, 2005;Armitage & Harrop, 2005). Most of these publications describe case studies of the use of VMs in specific IT courses and focus on the content of the exercises and how the lessons were conducted.…”