Cybersecurity Training
A Pathway to Readiness
Seiten
2024
Business Expert Press (Verlag)
978-1-63742-553-4 (ISBN)
Business Expert Press (Verlag)
978-1-63742-553-4 (ISBN)
Addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations. This book combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, and quality and information security management systems.
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom's Taxonomy of Cognitive Thought, and Kirkpatrick's Model of Evaluation, a trilogy of training best practices.
Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.
Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom's Taxonomy of Cognitive Thought, and Kirkpatrick's Model of Evaluation, a trilogy of training best practices.
Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.
Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
Greg Skulmoski, PhD, MBA, BEd, CITP, FBCS, enjoys dual career paths: he is an award-winning project manager and an innovation management academic from time to time, where he teaches graduate and undergraduate students and researches tomorrow's project opportunities and threats! Chris Walker is a Senior Managing Consultant in IBM's EMEA Talent Transformation practice, where he leads technology adoption and talent development programs for clients in healthcare, telecommunications, automotive, banking, mining, and technology industries.
Erscheinungsdatum | 07.12.2023 |
---|---|
Verlagsort | Sterling Forest |
Sprache | englisch |
Maße | 152 x 229 mm |
Gewicht | 272 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Wirtschaft ► Betriebswirtschaft / Management ► Projektmanagement | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 1-63742-553-8 / 1637425538 |
ISBN-13 | 978-1-63742-553-4 / 9781637425534 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Wie Geheimdienste und Kriminelle uns im Netz infiltrieren
Buch | Hardcover (2023)
Wiley-VCH (Verlag)
24,99 €
Konzepte – Verfahren – Protokolle
Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95 €
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
19,99 €