語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity education and training
~
Beuran, Razvan.
FindBook
Google Book
Amazon
博客來
Cybersecurity education and training
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity education and training/ by Razvan Beuran.
作者:
Beuran, Razvan.
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xvi, 323 p. :ill., digital ;24 cm.
內容註:
Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
Contained By:
Springer Nature eBook
標題:
Computer security - Study and teaching. -
電子資源:
https://doi.org/10.1007/978-981-96-0555-2
ISBN:
9789819605552
Cybersecurity education and training
Beuran, Razvan.
Cybersecurity education and training
[electronic resource] /by Razvan Beuran. - Singapore :Springer Nature Singapore :2025. - xvi, 323 p. :ill., digital ;24 cm.
Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
ISBN: 9789819605552
Standard No.: 10.1007/978-981-96-0555-2doiSubjects--Topical Terms:
3331876
Computer security
--Study and teaching.
LC Class. No.: QA76.9.A25 / B48 2025
Dewey Class. No.: 005.8
Cybersecurity education and training
LDR
:03010nmm a2200325 a 4500
001
2408640
003
DE-He213
005
20250407232803.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819605552
$q
(electronic bk.)
020
$a
9789819605545
$q
(paper)
024
7
$a
10.1007/978-981-96-0555-2
$2
doi
035
$a
978-981-96-0555-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
B48 2025
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
B567 2025
100
1
$a
Beuran, Razvan.
$3
3232014
245
1 0
$a
Cybersecurity education and training
$h
[electronic resource] /
$c
by Razvan Beuran.
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xvi, 323 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
520
$a
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
650
0
$a
Computer security
$x
Study and teaching.
$3
3331876
650
1 4
$a
Principles and Models of Security.
$3
3382356
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-96-0555-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514138
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 B48 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入