Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach
Evolves from the experience of educating students for more than ten years, following the same principle
Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation
Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools.
Provides many examples generated from actual occurrences, including those generated by European and NATO experiences