69,95 €
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
35 °P sammeln
69,95 €
69,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
35 °P sammeln
Als Download kaufen
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
35 °P sammeln
Jetzt verschenken
69,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
35 °P sammeln
  • Format: PDF

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain;…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 15.83MB
Produktbeschreibung
This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Izzat Alsmadi is an Assistant Professor in the department of computing and cyber security at the Texas A&M, San Antonio. He has his master and PhD in Software Engineering from North Dakota State University. He has more than 100 conference and journal publications. His research interests include: Software security, software engineering, software testing, social networks and software defined networking. He is lead editor of Information Fusion for Cyber-Security Analytics, Alsmadi, Izzat M, Karabatis, George, Aleroud, Ahmed, Springer, 2017. The author is also a member of The National Initiative for Cybersecurity Education (NICE) group, which meets frequently to discuss enhancements on cyber security education at the national level.
Rezensionen
"The book will also be of value to employers, human resources (HR) departments, and hiring managers to identify and define cybersecurity roles and skills within their organizations. Individuals can also use the book to explore career prospects in cybersecurity." (David B. Henderson, Computing Reviews, August 29, 2023)