LEADER 03442nam 22004695 450 001 9910993931003321 005 20250407232803.0 010 $a9789819605552 010 $a9819605555 024 7 $a10.1007/978-981-96-0555-2 035 $a(CKB)38337775700041 035 $a(DE-He213)978-981-96-0555-2 035 $a(MiAaPQ)EBC32004103 035 $a(Au-PeEL)EBL32004103 035 $a(EXLCZ)9938337775700041 100 $a20250407d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity Education and Training /$fby Razvan Beuran 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XVI, 323 p. 28 illus.) 311 08$a9789819605545 311 08$a9819605547 327 $aIntroduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion. 330 $aThis book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics. 606 $aComputer security 606 $aPrinciples and Models of Security 615 0$aComputer security. 615 14$aPrinciples and Models of Security. 676 $a005.8 700 $aBeuran$b Razvan$4aut$4http://id.loc.gov/vocabulary/relators/aut$01817274 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910993931003321 996 $aCybersecurity Education and Training$94374875 997 $aUNINA