Professional Documents
Culture Documents
APPlIed Methods
We present the various instructional methods we
have used for SecRet. Our methods follow the 5E
Instructional Model in terms of goals and main
concepts (engage, explain, explore, elaborate, Figure 1. The 5E Model applied to the SecRet
and evaluate), but for the overall syllabus, not a course.
single unit of learning. Therefore, there are differ-
ences in relation to the traditional 5E Instructional The surveys and feedback questionnaires were
Model. This mainly comes from a lack of time to conducted with the main goal of increasing the
cover all the topics of the course, because the 5E engagement of the students in the course.
Instructional Model might require several days
for a single topic. This makes it more suitable for lectures
school learning, where the number of allocated The course maintained the traditional tech-
hours is higher, and the quantity of information is niques of lecturing, but we enhanced the teach-
lower than in the higher education system. Never- ing process through modern technologies.
theless, we show that the main concepts can be Examples include video and audio support with
successfully applied to higher education programs real-life examples. Usage of slides and projector
as well and nicely adapted to students, who are was the usual method to explain and discuss
expected to be more independent learners. Fig- the topics.
ure 1 gives an overview of how we have applied We used lecturing as the main technique
the 5E model to our SecRet course. to explain new concepts and protocols. These
include the mandatory topics, such as general
surveys And feedbAck principles and security aspects, widely used stan-
In the first lecture, we conducted a survey to dis- dards and protocols for wired and wireless net-
cover the students’ backgrounds. We then based works (e.g., WEP/WPA/WPA2, 2G/3G/4G), and
our teaching process on their previous knowl- attacks and vulnerabilities.
edge. This is not an easy task, especially if they The lectures included inquiry-based teaching
have disparate backgrounds and knowledge lev- methods: asking questions, reviewing what is
els, but it makes the course more comprehensible already known, and reasoning about comparisons
for the majority. As a consequence, the students and predictions [6]. Moreover, we have tried to
are generally pleased to attend the lectures. repeat important concepts and make analogies to
Feedback is essential. Thus, we consider a good previously studied notions to make students learn
practice to collect feedback whenever possible by repetition.
during the course. In our case, we collected spe-
cific feedback at the end of the interactive labora- lecture ActIvItIes
tories and general feedback using an anonymous During the lecture hours, we sometimes paused
online form. For both the survey in the first lecture teaching and involved students in different
and the feedback we have used Google Forms. activities on the given topic. To preserve the