<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleksandr Gordieiev</style></author><author><style face="normal" font="default" size="100%">Taras Lobur</style></author><author><style face="normal" font="default" size="100%">Ruslan Kozak</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CCNA Security curriculum</style></keyword><keyword><style  face="normal" font="default" size="100%">certification program</style></keyword><keyword><style  face="normal" font="default" size="100%">Cisco Systems’ courses</style></keyword><keyword><style  face="normal" font="default" size="100%">curriculum</style></keyword><keyword><style  face="normal" font="default" size="100%">IT specialist</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">151-163</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Leading companies in the field of ICT often provide training courses. Such courses are found attractive by students, especially students specializing in technical disciplines. In this article, we review courses provided by Cisco Systems, describe their organization, nomenclature and structure, and provide recommendations on their use in the academic curricula in the field of information and communications security. The inclusion of such courses in the academic curricula is considered beneficial in terms of competitiveness of graduates on the current and foreseen labour markets.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">151</style></section></record></records></xml>