M. Dark, M. Bishop, and .. , Richard Linger, and Luanne Goldrich Assurance Cases as a Didactic Tool for Information Security, p.15

R. Gallo and R. , Dahab Cognitive Task Analysis Based Training for Cyber Situation Awareness, p.27

Z. Huang, C. Shen, S. Doshi, and .. , Nimmi Thomas, and Ha Duong A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure, p.41

A. Jøsang, M. Ødegaard, and .. , and Erlend Oftedal Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses, p.64

S. Raina and B. Taylor, and Siddharth Kaza The Use of Software Design Patterns to Teach Secure Software Design

J. Van, N. , L. App, and .. , Futcher Tools and Applications for Teaching Learn to Spot Phishing URLs with the Android NoPhish

G. Canova, M. Volkamer, C. Bergmann, R. Borza, and B. Reinheimer, Simon Stockhardt, and Ralf Tenberg An Innovative Approach in Digital Forensic Education and Training, p.101