Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Education & Training
Education & Training
Education & Training
Education & Training, Cyber exercises
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
Nikolova, Irena
.
"
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
."
Information & Security: An International Journal
38 (2017): 79-92.
3806_Cybersecurity Capacity Building
— Downloaded 6120 times
Read more
about Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
14213 reads
Google Scholar
DOI
RTF
EndNote XML
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 7377 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
55481 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
15333 reads
Google Scholar
RTF
EndNote XML
A Generic Reference Curriculum on Cybersecurity
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum
— Downloaded 4855 times
Read more
about A Generic Reference Curriculum on Cybersecurity
15435 reads
Google Scholar
DOI
RTF
EndNote XML
Smart Grid Safety and Security: Educational and Research Activities
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Smart GRID Safety and Security
— Downloaded 4998 times
Read more
about Smart Grid Safety and Security: Educational and Research Activities
13532 reads
Google Scholar
DOI
RTF
EndNote XML
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Cisco in ICT Security Academic Curricula
— Downloaded 4750 times
Read more
about Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
12690 reads
Google Scholar
DOI
RTF
EndNote XML
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
Formal and Intelligent Methods
— Downloaded 4403 times
Read more
about Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
13848 reads
Google Scholar
DOI
RTF
EndNote XML
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Cyber Security of Critical Infrastructures
— Downloaded 6085 times
Read more
about An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
14225 reads
Google Scholar
DOI
RTF
EndNote XML
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
IMECA-private communications-training
— Downloaded 4959 times
Read more
about Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
13265 reads
Google Scholar
DOI
RTF
EndNote XML
Development of Tools for Practical Research on Cybersecurity in Msc Theses
Zhukovyts’kyy, Igor
, and
Denis Ostapec
.
"
Development of Tools for Practical Research on Cybersecurity in Msc Theses
."
Information & Security: An International Journal
35, no. 1 (2016): 81-97.
Cyber research MSc thesis
— Downloaded 4418 times
Read more
about Development of Tools for Practical Research on Cybersecurity in Msc Theses
15319 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance