Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations. Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom’s Taxonomy of Cognitive Thought, and Kirkpatrick’s Model of Evaluation, a trilogy of training best practices. Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects. Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness. Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity projects. More experienced cybersecurity professionals will appreciate the innovative and lean elements of this approach. The reader is guided through the delivery, management, and optimization approach that increases the probability of cybersecurity project success. Cybersecurity project management in Shields Up brings together international frameworks such as the Guide to the Project Management Body of Knowledge, the National Institute of Standards and Technology Cybersecurity Framework, ITIL 4 Service Management, the ISO 27001 Information Security Management, ISO 31000 Risk Management, and ISO 9000 Quality Management. A key benefit of this book is the reader can quickly apply the hybrid project management approach since it combines global frameworks already followed by cybersecurity professionals leading to successful projects. Never before has cybersecurity project management been so important.
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness. Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity projects. More experienced cybersecurity professionals will appreciate the innovative and lean elements of this approach. The reader is guided through the delivery, management, and optimization approach that increases the probability of cybersecurity project success. Cybersecurity project management in Shields Up brings together international frameworks such as the Guide to the Project Management Body of Knowledge, the National Institute of Standards and Technology Cybersecurity Framework, ITIL 4 Service Management, the ISO 27001 Information Security Management, ISO 31000 Risk Management, and ISO 9000 Quality Management. A key benefit of this book is the reader can quickly apply the hybrid project management approach since it combines global frameworks already followed by cybersecurity professionals leading to successful projects. Never before has cybersecurity project management been so important.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.