Press "Enter" to skip to content

Scholar

People, Process & Technology: Cyber Security

People, Processes, and Technology Security Tactics There are various approaches that IT teams should consider when attempting to develop a tiered security environment: People Employees…

Detecting Security Gap: Hand-On or Hand-OFF

MITRE ATT&CK is gradually becoming the de facto tool for analysing and mapping attacker behaviour. In general, there are two methods for detecting security gaps. The…

Web resources: Creating a teaching portfolio

Creating a teaching portfolio The final teaching portfolio component requires you to compile and finalize your teaching portfolio, which you may then use in the…

Five Teaching Styles to Practice: Teaching Personality

Throughout the last century, traditional teaching methods have undergone significant changes; brought on by social, cultural and technological developments.  In the contemporary classroom, five distinct…

Early career teaching experience

When I started teaching I was afraid of students’ feedback. I remember that after one of my earliest teaching experiences, one of the comments from…