Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Education & Training
Education & Training
Education & Training
Education & Training, Cyber exercises
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
Nikolova, Irena
.
"
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
."
Information & Security: An International Journal
38 (2017): 79-92.
3806_Cybersecurity Capacity Building
— Downloaded 5883 times
Read more
about Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
13864 reads
Google Scholar
DOI
RTF
EndNote XML
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 7157 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
54618 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
14992 reads
Google Scholar
RTF
EndNote XML
A Generic Reference Curriculum on Cybersecurity
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum
— Downloaded 4690 times
Read more
about A Generic Reference Curriculum on Cybersecurity
15028 reads
Google Scholar
DOI
RTF
EndNote XML
Smart Grid Safety and Security: Educational and Research Activities
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Smart GRID Safety and Security
— Downloaded 4818 times
Read more
about Smart Grid Safety and Security: Educational and Research Activities
13235 reads
Google Scholar
DOI
RTF
EndNote XML
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Cisco in ICT Security Academic Curricula
— Downloaded 4568 times
Read more
about Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
12398 reads
Google Scholar
DOI
RTF
EndNote XML
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
Formal and Intelligent Methods
— Downloaded 4262 times
Read more
about Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
13536 reads
Google Scholar
DOI
RTF
EndNote XML
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Cyber Security of Critical Infrastructures
— Downloaded 5909 times
Read more
about An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
13888 reads
Google Scholar
DOI
RTF
EndNote XML
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
IMECA-private communications-training
— Downloaded 4727 times
Read more
about Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
12938 reads
Google Scholar
DOI
RTF
EndNote XML
Development of Tools for Practical Research on Cybersecurity in Msc Theses
Zhukovyts’kyy, Igor
, and
Denis Ostapec
.
"
Development of Tools for Practical Research on Cybersecurity in Msc Theses
."
Information & Security: An International Journal
35, no. 1 (2016): 81-97.
Cyber research MSc thesis
— Downloaded 4259 times
Read more
about Development of Tools for Practical Research on Cybersecurity in Msc Theses
14996 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance