Cybersecurity Training: A Pathway to Readiness
By Gregory J. Skulmoski and Chris Walker
()
About this ebook
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.
Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom’s Taxonomy of Cognitive Thought, and Kirkpatrick’s Model of Evaluation, a trilogy of training best practices.
Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.
Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
Gregory J. Skulmoski
Greg Skulmoski, PhD, MBA, BEd, CITP, FBCS, enjoys dual career paths: he is an award-winning project manager and an innovation management academic from time to time, where he teaches graduate and undergraduate students and researches tomorrow’s project opportunities and threats!
Related to Cybersecurity Training
Related ebooks
Shields Up: Cybersecurity Project Management Rating: 0 out of 5 stars0 ratingsCan. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Rating: 5 out of 5 stars5/5Building Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsA Practitioner's Guide to Adapting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsFundamentals of Adopting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsCyberSecure™: An Essential Guide to Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsThe Little Book of Cybersecurity Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity: A Project Management Approach Rating: 0 out of 5 stars0 ratingsCyber Guardians: Empowering Board Members for Effective Cybersecurity Rating: 0 out of 5 stars0 ratingsBlueprints of DevSecOps: Foundations to Fortify Your Cloud Rating: 0 out of 5 stars0 ratingsDefending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsBreaking Into IT: Your Roadmap to Success in the Tech Industry Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCCSP Certified Cloud Security Professional A Step by Step Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsCybersecurity ABCs: Delivering awareness, behaviours and culture change Rating: 0 out of 5 stars0 ratingsCertified Cybersecurity Compliance Professional Rating: 5 out of 5 stars5/5Security Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsThe CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratingsSee Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsTargeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5CISSP® Study Guide Rating: 3 out of 5 stars3/5Cybersecurity Rating: 0 out of 5 stars0 ratings
Business For You
Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Lying Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5How to Get Ideas Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5The Book of Beautiful Questions: The Powerful Questions That Will Help You Decide, Create, Connect, and Lead Rating: 4 out of 5 stars4/5Red Notice: A True Story of High Finance, Murder, and One Man's Fight for Justice Rating: 4 out of 5 stars4/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/5Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity Training
0 ratings0 reviews