語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity education and training
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybersecurity education and training/ by Razvan Beuran.
作者:
Beuran, Razvan.
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xvi, 323 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Principles and Models of Security. -
電子資源:
https://doi.org/10.1007/978-981-96-0555-2
ISBN:
9789819605552
Cybersecurity education and training
Beuran, Razvan.
Cybersecurity education and training
[electronic resource] /by Razvan Beuran. - Singapore :Springer Nature Singapore :2025. - xvi, 323 p. :ill., digital ;24 cm.
Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
ISBN: 9789819605552
Standard No.: 10.1007/978-981-96-0555-2doiSubjects--Topical Terms:
1225876
Principles and Models of Security.
LC Class. No.: QA76.9.A25 / B48 2025
Dewey Class. No.: 005.8
Cybersecurity education and training
LDR
:03010nam a2200325 a 4500
001
1160733
003
DE-He213
005
20250407232803.0
006
m d
007
cr nn 008maaau
008
251029s2025 si s 0 eng d
020
$a
9789819605552
$q
(electronic bk.)
020
$a
9789819605545
$q
(paper)
024
7
$a
10.1007/978-981-96-0555-2
$2
doi
035
$a
978-981-96-0555-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
B48 2025
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
B567 2025
100
1
$a
Beuran, Razvan.
$3
1132189
245
1 0
$a
Cybersecurity education and training
$h
[electronic resource] /
$c
by Razvan Beuran.
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xvi, 323 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
520
$a
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
650
1 4
$a
Principles and Models of Security.
$3
1225876
650
0
$a
Computer security
$x
Study and teaching.
$3
1204522
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-96-0555-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入