Text
SecRet : How to Apply the 5E Model for a Master’s Level Network Security Course
Engagement, exploration, explication, elaboration, and evaluation are the five stages of learning of the 5E's Instructional Model. We show that the 5E's main concepts can be successfully applied to a Master's level course in network security to provide a student-centered learning approach. We present the various techniques that we have used during the course, with a focus on active learning enhanced by technology usage. We provide examples, insights, and recommendations that are intended to help other educators. Our findings are general and can be applied in other contexts as well.
Barcode | Tipe Koleksi | Nomor Panggil | Lokasi | Status | |
---|---|---|---|---|---|
art134469 | null | Artikel | Gdg9-Lt3 | Tersedia namun tidak untuk dipinjamkan - No Loan |
Tidak tersedia versi lain