<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Luke Topham</style></author><author><style face="normal" font="default" size="100%">Kashif Kifayat</style></author><author><style face="normal" font="default" size="100%">Younis A. Younis</style></author><author><style face="normal" font="default" size="100%">Qi Shi</style></author><author><style face="normal" font="default" size="100%">Bob Askwith</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Teaching and Learning Laboratories: A Survey</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">Computing Laboratory</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">Pedagogy</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword><keyword><style  face="normal" font="default" size="100%">Virtualisation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">51-80</style></pages><abstract><style face="normal" font="default" size="100%">Currently there is a great demand for trained cyber security professionals with hands-on skills. The need for these professionals stems from our reliance on technology in many aspects of our daily lives and the smooth running of modern governments, education and health services. These professionals are desperately needed to defend cyberspace from threats such as hackers and malware who threaten to disrupt such services daily. This paper presents an insight into current approaches taken in the practical teaching of cyber security. We also give requirements and best practices for future training platforms based on a defined teaching process.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">51</style></section></record></records></xml>