Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cybersecurity training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(1/82)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
2
book article
Developing military cyber workforce in a conscript armed forces : recruitment, challenges and options
Sõmer, Tiia
;
Lorenz, Birgy
;
Ottis, Rain
14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings
2019
/
p. 413−421
http://toc.proceedings.com/48113webtoc.pdf
"ICCWS 2019"
book article
3
journal article EST
/
journal article ENG
The human factor in cyber security education : editorial
Lugo, Ricardo Gregorio
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Bukauskas, Linas
;
Brilingaitė, Agnė
;
Maennel, Olaf Manuel
Frontiers in education
2023
/
art. 1277282, 2 p
https://doi.org/10.3389/feduc.2023.1277282
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian Nicholas
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
82
1.
cybersecurity training
2.
cybersecurity practical training
3.
automotive cybersecurity
4.
cybersecurity
5.
cybersecurity (CS)
6.
cybersecurity awareness
7.
cybersecurity behaviors
8.
cybersecurity breach
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity knowledge requirements
16.
cybersecurity law
17.
cybersecurity market demand
18.
cybersecurity policy
19.
cybersecurity simulations
20.
cybersecurity skills gap
21.
cybersecurity standards
22.
cybersecurity test bed
23.
cybersecurity testing
24.
cybersecurity workforce development
25.
cybersecurity vulnerability
26.
EU cybersecurity policy
27.
European cybersecurity capacity building
28.
European Cybersecurity Skills Framework (ECSF)
29.
human factor of cybersecurity
30.
maritime cybersecurity
31.
maritime cybersecurity certification teaching
32.
organising cybersecurity exercises
33.
responsibility/penalty for a cybersecurity breach
34.
set of possible cybersecurity breaches
35.
ADR Regulations Training Course
36.
ADR regulations training courses
37.
advanced training
38.
adversarial training
39.
aerobic training
40.
care workers training
41.
civil service training
42.
civil-service training
43.
cognitive training
44.
continual training
45.
design management training
46.
DG training courses
47.
distance training
48.
educational and training programs
49.
e-Governance training
50.
general training
51.
high-intensity interval training
52.
management training
53.
maritime education and training
54.
maritime higher education and training (MHET)
55.
marketing training
56.
multilingual training
57.
panel training
58.
pedagogical training
59.
PhD training
60.
professional training
61.
research and training scenarios
62.
resistance training
63.
safety training
64.
security training
65.
self-training
66.
simulation training
67.
small training data set
68.
teacher training
69.
technical teacher training
70.
technical training
71.
training
72.
training and education
73.
training and research tool
74.
training data
75.
Training gap detector
76.
training needs analysis
77.
training needs assessment
78.
training set optimization
79.
weakly supervised training
80.
web-based training
81.
vocational education and training
82.
vocational education and training VET
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT