This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.
The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.
This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
"synopsis" may belong to another edition of this title.
Razvan Beuran received the B.Sc., M.Sc., and Ph.D. degrees from Politehnica University of Bucharest, Romania, in 1999, 2000, and 2004, respectively; the Ph.D. degree was delivered jointly with Jean Monnet University, Saint Etienne, France. From 2006 to 2015, he was with the National Institute of Information and Communications Technology, Hokuriku StarBED Technology Center, Japan. Since 2015, Razvan is Associate Professor with Japan Advanced Institute of Science and Technology (JAIST), Ishikawa, Japan. His current research topics are cybersecurity, IoT/CPS security, trustworthiness, and cybersecurity training. He is a senior member of IEEE, and a member of ACM and IPSJ.
In his spare time, Razvan enjoys playing shakuhachi, a Japanese longitudinal end-blown bamboo flute, for which he has a Tozan School Master license. His other hobbies include hiking and swimming.
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.
The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.
This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
"About this title" may belong to another edition of this title.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand. Seller Inventory # GFKXGJ6TC8
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 50081648-n
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 50081648-n
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 50081648
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9789819605545_new
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 50081648
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics. 340 pp. Englisch. Seller Inventory # 9789819605545
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26404244236
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Seller Inventory # 1929864870
Quantity: Over 20 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND. Seller Inventory # 18404244230