Academic literature on the topic 'Cybersecurity certification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity certification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity certification"
Al Harrack, Micheline. "Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications." International Journal on Integrating Technology in Education 10, no. 2 (June 30, 2021): 65–76. http://dx.doi.org/10.5121/ijite.2021.10206.
Full textWang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (July 2019): 38–57. http://dx.doi.org/10.4018/ijhiot.2019070104.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (December 31, 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Full textAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (April 28, 2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Full textGunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.
Full textMitrakas, Andreas. "The emerging EU framework on cybersecurity certification." Datenschutz und Datensicherheit - DuD 42, no. 7 (June 29, 2018): 411–14. http://dx.doi.org/10.1007/s11623-018-0969-2.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (March 1, 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textNikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (August 29, 2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.
Full textDissertations / Theses on the topic "Cybersecurity certification"
Брайко, Б. В., and B. V. Braiko. "Професійна підготовка магістрів з кібербезпеки в університетах Великої Британії." Дисертація, Хмельницький національний університет, 2019. http://elar.khnu.km.ua/jspui/handle/123456789/10229.
Full textThe thesis presents a comprehensive comparative analysis of professional training of Masters in Cybersecurity at UK universities to implement innovative aspects of such experience in the Ukrainian system of education. The justification of new conceptual approaches to improving professional training of Masters in Cybersecurity should pay special attention to the results of scientific research and prognostic ideas of the international experience, in particular, that of the UK, in the context of Ukraine’s integration into the European Higher Education Area. The thesis describes the coverage of professional training of Masters in Cybersecurity in the psycho-pedagogical literature and justifies the dependence of the development of cybersecurity policy on the level of professional competency of specialists in cybersecurity. It specifies that both the external and internal security of the state, as well as the protection of interests, health and personal information of its citizens, depends on high-quality activities of institutions and organizations providing information security services, that is on professional competency of specialists in cybersecurity. It analyzes the requirements of international organizations (“ENISA”, “IMPACT”, “OSCE”, “NSA”) for professional activities and training of specialists in cybersecurity which are reflected in the formulation of goals, the specification of the content, forms, methods and technologies of professional training of Masters in Cybersecurity, as well as in the justification of their professional competencies in cyberspace. It singles out the following areas in the UK cybersecurity policy: the coherence of criteria of the Global Cybersecurity Index (GCI) and the promotion of the main goals and conceptual frameworks of the Global Cyber Security Programme; the creation of a platform for the cybersecurity of different sectors of the economy; the development of special information systems and technologies, as well as separate software products; the active establishment of public-private partnerships on cyber-threat information sharing and cybersecurity incident management; the elaboration of cybersecurity industry-standards and framework programmes with business, science and the public; the introduction of a certification system for companies and specialists; the involvement of business in financing degree programmes in Cybersecurity; the establishment of special centres for sharing experience. The analysis of regulatory documents in the field of cybersecurity in the UK shows that it is somewhat complicated and changes rapidly. According to professional standards, the goals of masters programmes on Cybersecurity include consolidating professional knowledge (understanding key concepts, principles, technologies and practices) and developing professional and methodological skills in cybersecurity. Also, the thesis describes the characteristics of the educational process in the context of masters training at UK universities. The study of degree programmesand curricula of the leading UK universities shows that the content of such training organically combines fundamental, professional, research and practical training, contributing to the pursuit of career prospects and scientific and professional growth of cybersecurity. The thesis clarifies that practical training of masters training is a compulsory component of the content of masters programmes, which involves various forms (internships, participation in scientific and international projects, volunteering, mentoring, working with partners). It finds that the quality of masters programmes on Cybersecurity at UK universities is enhanced by using interactive teaching forms, methods and technologies. It must be noted that the use of innovative teaching methods and technologies is primarily aimed at improving the results of masters training, boosting motivation towards learning and enhancing practical experience. Particular attention is paid to the development of project skills while conducting research. Masters training also includes professional and research internship, which is an organic part of degree programmes and employment. Students can be offered to assist in creating a CV and developing interviewing skills. Finally, the thesis explores the current conditions of masters programmes on Cybersecurity at Ukrainian universities and presents a comparative pedagogical analysis of the peculiarities of professional training of Masters in Cybersecurity in the UK and Ukraine. The study of the UK experience has made it possible to justify scientific and methodological recommendations for improving professional training of Masters in Cybersecurity at Ukrainian universities at the strategic, organizational, content-related and technological levels. The scientific value of the obtained results is as follows: for the first time, the organizational and didactic peculiarities of professional training of Masters in Cybersecurity at UK universities (a free choice of an individual educational trajectory for career advancement based on the integration and diversification of degree programmes and the certification of professional qualifications; the standardized and interdisciplinary content of professional training; professional and research focus; the consistency with the requirements and needs of cyber policy; an applied nature of degree programmes; a high level of independent research and research activities; innovative and interactive forms, methods and technologies of teaching and learning) have been revealed; professional training of Masters in Cybersecurity at UK and Ukrainian universities has been comparatively and pedagogically analyzed; the possibilities of implementing innovative ideas of the UK experience with the aim to improve professional training of Masters in Cybersecurity at Ukrainian universities have been outlined; the content and the instructional-and-methodological support of professional training of Masters in Cybersecurity at Ukrainian universities have been improved (the author’s specialized course has been developed); the statements on the essential characteristics and the content of the concept of “masters training in Cybersecurity” and its interpretation in accordance with the international and Ukrainian semantics, as well as on current trends in the development of IT education under the conditions of creating global cybersecurity space, have been further developed. The practical value of the obtained results can be proved by the author’s instructional-and-methodological recommendations, titled “Professional Training of Masters in Cybersecurity: the UK Experience”, which justify the ways of using innovative ideas of the UK experience to update professional training of Masters in Cybersecurity in Ukraine. The main principles, theoretical conclusions and sources of this research should be included in the development of education standards on professional training of Masters in Cybersecurity, specialized courses and special seminars on professional training of IT specialists, as well as in the improvement of professional training of future specialists in cybersecurity in Ukraine.
Gil, Filipa Cristina Pereira. "A implementação do Regulamento de Cibersegurança (Cybersecurity Act) e o seu impacto para cibersegurança." Master's thesis, 2021. http://hdl.handle.net/10071/24985.
Full textTechnology has an important role in our private lives, business and states at a global level. We rely on technology to communicate, to work, for social activities, health, energy, transportation and to innovate in a green way. Since 1985 the European Union started to formulate initiatives and cybersecurity policy, in the beginning as a solution to enhance the economy, after was as a way to protect critical infrastructures and as a broad and cohesive way that involves ciber criminality, technological innovation and cyber defense. The creation of the new Cybersecurity Act, which entered into force in 2019, has the objectives of increasing the level of European cybersecurity and to avoid the fragmentation of the European market from the large number of certification schemes. It is the objective of this dissertation to analyze the impacts that the Cybersecurity Act will have in its implementation and what contribution will it have in the construction of the European cybersecurity project and not just being a tool to harmonize the market. For this reason, we will use the policy implementation method from Sabatier and Mazmanian (1983), because the Cybersecurity Act is of voluntary adherence and it depends on national incentives. We also present Germany as a case study example.
Books on the topic "Cybersecurity certification"
Walker, Matt, Fernando J. Maymi, and Brent Earl Chapman. CompTIA CSA+ Cybersecurity Analyst Certification. McGraw-Hill Education, 2017.
Find full textMaymi, Fernando, Jeff T. Parker, and Brent Chapman. CompTIA CySA+ Cybersecurity Analyst Certification Bundle. McGraw-Hill Education, 2018.
Find full textCompTIA CySA+ Cybersecurity Analyst Certification Practice Exams. McGraw-Hill Education, 2018.
Find full textCybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. IT Governance Ltd, 2020.
Find full textVoice), Maxwell (Male Synthesized. Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. de Gruyter GmbH, Walter, 2020.
Find full textCCNA Cybersecurity Operations Course Booklet. Cisco Press, 2018.
Find full textRogers, Bobby E. CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002). McGraw-Hill Education, 2021.
Find full textMaymi, Fernando, Brent Chapman, and Kelly Sparks. CompTIA CySA+ Cybersecurity Analyst Certification Bundle (Exam CS0-002). McGraw-Hill Education, 2021.
Find full textAcademy, Cisco Networking. CCNA Cybersecurity Operations Companion Guide. Cisco Press, 2018.
Find full textCompTIA Cybersecurity Analyst Cert Guide. Pearson IT Certification, 2017.
Find full textBook chapters on the topic "Cybersecurity certification"
Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hübner. "Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs." In Cybersecurity Teaching in Higher Education, 103–25. Cham: Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-24216-8_5.
Full textWang, Ping, and Hubert D’Cruze. "Cybersecurity Certification: Certified Information Systems Security Professional (CISSP)." In 16th International Conference on Information Technology-New Generations (ITNG 2019), 69–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-14070-0_11.
Full textFenton, Demitrius, Terry Traylor, Guy Hokanson, and Jeremy Straub. "Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs." In The Challenges of the Digital Transformation in Education, 632–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11935-5_60.
Full textAcosta, Mauricio Alexander Nieto, and Hamid Jahankhani. "An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework." In Advanced Sciences and Technologies for Security Applications, 67–103. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_4.
Full textNijdam, Niels A., Meriem Benyahya, and Anastasija Collen. "Cybersecurity and Data Privacy: Stakeholders’ Stand on Regulations and Standards." In Contributions to Management Science, 151–68. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61681-5_6.
Full textDavis, Adrian. "The Role of Cybersecurity Certifications." In Cybersecurity Education for Awareness and Compliance, 222–48. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7847-5.ch012.
Full textDavis, Adrian. "The Role of Cybersecurity Certifications." In Research Anthology on Advancements in Cybersecurity Education, 93–118. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3554-0.ch005.
Full textWang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." In Research Anthology on Advancements in Cybersecurity Education, 119–38. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3554-0.ch006.
Full textMatheu, Sara N., and Antonio F. Skarmeta. "10. Cybersecurity Certification in IoT Environments." In Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection. Now Publishers, 2020. http://dx.doi.org/10.1561/9781680836837.ch10.
Full textBishop, Matt, Diana Burley, and Lynn A. Futcher. "Cybersecurity Curricular Guidelines." In Cybersecurity Education for Awareness and Compliance, 158–80. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7847-5.ch009.
Full textConference papers on the topic "Cybersecurity certification"
Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hubner. "Towards Cybersecurity MOOC Certification." In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2021. http://dx.doi.org/10.1109/eurospw54576.2021.00008.
Full textHovhannisyan, Kristine, Piotr Bogacki, Consuelo Assunta Colabuono, Domenico Lofu, Maria Vittoria Marabello, and Brady Eugene Maxwell. "Towards a Healthcare Cybersecurity Certification Scheme." In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021. http://dx.doi.org/10.1109/cybersa52016.2021.9478255.
Full textKaragiannis, Stylianos, Marco Manso, Emmanouil Magkos, Luis L. Ribeiro, and Luis Campos. "Automated and On-Demand Cybersecurity Certification." In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2021. http://dx.doi.org/10.1109/csr51186.2021.9527958.
Full textAljebur, Kaled, Mostfa Albdair, and Ron Addie. "Cybersecurity of a Fact Certification Network." In 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2022. http://dx.doi.org/10.1109/itnac55475.2022.9998426.
Full textOliveira, Andre da Silva, and Henrique Santos. "Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification." In 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, 2022. http://dx.doi.org/10.1109/drcn53993.2022.9758022.
Full textKyranoud, Pinelopi, Eleni Maria Kalogeraki, Alexandra Michota, and Nineta Polemi. "Cybersecurity Certification Requirements for Supply Chain Services." In 2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2021. http://dx.doi.org/10.1109/iscc53001.2021.9631467.
Full textMichota, Alexandra, and Nineta Polemi. "A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850323.
Full textAxelrod, C. Warren. "The creation and certification of software cybersecurity standards." In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2016. http://dx.doi.org/10.1109/lisat.2016.7494112.
Full textPhilippe, Massonet. "First International Workshop on lightweight and Incremental Cybersecurity Certification." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00017.
Full textPonsard, Christophe, Philippe Massonet, Jeremy Grandclaudon, and Nicolas Point. "From Lightweight Cybersecurity Assessment to SME Certification Scheme in Belgium." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00019.
Full textReports on the topic "Cybersecurity certification"
Hupp, William, Danish Saleem, Jordan Peterson, and Kenneth Boyce. Cybersecurity Certification Recommendations for Interconnected Grid Edge Devices and Inverter Based Resources. Office of Scientific and Technical Information (OSTI), November 2021. http://dx.doi.org/10.2172/1832209.
Full textChhaya, Sunil. Cybersecurity Platform and Certification Framework Development for Extreme Fast Charging (XFC)-Integrated Charging Ecosystem. Office of Scientific and Technical Information (OSTI), May 2023. http://dx.doi.org/10.2172/1973254.
Full textChhaya, Sunil. Cybersecurity Platform and Certification Framework Development for Extreme Fast Charging (XFC)-Integrated Charging Ecosystem. Office of Scientific and Technical Information (OSTI), April 2023. http://dx.doi.org/10.2172/1974448.
Full text