Torrent details for "Beuran R. Cybersecurity Education and Training 2025" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
7.6 MB
Info Hash:
A15134F13477BF69EA815256B0BED6AB7881C76A
Added By:
Added:
April 20, 2026, 4:51 p.m.
Stats:
|
(Last updated: April 20, 2026, 4:56 p.m.)
| File | Size |
|---|---|
| Beuran R. Cybersecurity Education and Training 2025.pdf | 7.6 MB |
NOTE
SOURCE: Beuran R. Cybersecurity Education and Training 2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. Introduction Part I. Cybersecurity Education and Training Methodologies Cybersecurity Education and Training Technical Cybersecurity Training Attack Training Forensics Training Defense Training IoT Security Training Cybersecurity Awareness Training Part II. Cybersecurity Training Platforms Cybersecurity Training Platform Overview Capture the Flag Platforms Cyber Ranges Detailed Case Study: CyTrONE Training Platform Capability Assessment Conclusion
×


