Academic literature on the topic 'Cybersecurity certification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity certification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity certification"

1

Al Harrack, Micheline. "Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications." International Journal on Integrating Technology in Education 10, no. 2 (2021): 65–76. http://dx.doi.org/10.5121/ijite.2021.10206.

Full text
Abstract:
The Occupational Information Network O*NET is considered the primary source of occupational information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce readiness certification programs. The O*NET database is used to map out education requirements and how they relate to professional certifications as required by employers and job designers in accordance with the National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Sta
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (2019): 38–57. http://dx.doi.org/10.4018/ijhiot.2019070104.

Full text
Abstract:
The workforce demand for cybersecurity professionals has been substantial and fast growing. Qualified cybersecurity professionals with appropriate knowledge, skills, and abilities for various tasks and job roles are needed to perform the challenging work of defending the cyber space. The certified information systems security professional (CISSP) certification is a globally recognized premier cybersecurity credential and validation of qualifications. This case study analyzes the CISSP certification requirements, domains and objectives and attempts to map them to the cybersecurity industry comp
APA, Harvard, Vancouver, ISO, and other styles
3

Tsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on asse
APA, Harvard, Vancouver, ISO, and other styles
4

Olena, Tsvilii. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. https://doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
<em>The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment &ndash; Vocabulary and general principles. Cybersecurity certification systems and schemes are bas
APA, Harvard, Vancouver, ISO, and other styles
5

Tsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.

Full text
Abstract:
Cybersecurity of information and communication technologies (hereinafter - ICT) is a key issue for maintaining the functioning and security of the digital economy and public administration in the soon. An important role in the field of cybersecurity is played by the conformity assessment (certification) of cybersecurity. This may apply to the cybersecurity of ICT components, products, equipment, services and processes, to the cybersecurity of cloud services, to the cybersecurity of technological processes, to personal competence in the field of cybersecurity, and so on. Cybersecurity certifica
APA, Harvard, Vancouver, ISO, and other styles
6

Matheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 5 (2020): 1–36. https://doi.org/10.1145/3410160.

Full text
Abstract:
In recent years, cybersecurity certification is gaining momentum as the baseline to build a structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This initiative is driven by industry, governmental institutions, and research communities, which have the goal to make IoT more secure for the end-users. In this survey, we analyze the current cybersecurity certification schemes, as well as the potential challenges to make them applicable for the IoT ecosystem. We also examine current efforts related to risk assessment and testing processes, which are widely recognized
APA, Harvard, Vancouver, ISO, and other styles
7

Hernández-Ramos, José Luis, Sara Nieves Matheu-García, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification." IEEE Security & Privacy 19, no. 1 (2021): 99–102. https://doi.org/10.1109/MSEC.2020.3037845.

Full text
Abstract:
In 2019, the new European Union (EU) cybersecurity regulation &quot;Cybersecurity Act&quot; (&quot;CSA&quot;)<sup>1</sup> entered into force to create a common framework for the certification of any information and communication technology (ICT) system, including products, services, and processes. The main purpose of this framework is to reduce the current fragmentation of cybersecurity certification schemes2 as well as to increase end users? trust in a hyperconnected society3 by fostering a mutual recognition of certified ICT components in any EU country.
APA, Harvard, Vancouver, ISO, and other styles
8

Ananda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.

Full text
Abstract:
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order. In response, European Union established an appropriate regulation in cybercrime namely The Cybersecurity Act. The Act as an international regime does not only gives a permanent mandate that strengthens European Union Agency for Network and Information Security (ENISA) but also establishes The EU Cybersecurity Certification Scheme in order to increase cybersecurity and build cyber resilience in the European Union Digital S
APA, Harvard, Vancouver, ISO, and other styles
9

Gunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.

Full text
Abstract:
This study aims to analyze and examine the influence of internal auditor certification, risk assessment, and the role of senior management on the effectiveness of cybersecurity for internal auditors who have experience in cybersecurity and information technology. This research method is a quantitative method, data analysis uses structural equation modeling (SEM) with SmartPLS 3.0 software tools. The population of this study is internal auditors who have experience in cybersecurity and information technology. The sample for this study was 480 respondents who were determined by the snowball samp
APA, Harvard, Vancouver, ISO, and other styles
10

Mitrakas, Andreas. "The emerging EU framework on cybersecurity certification." Datenschutz und Datensicherheit - DuD 42, no. 7 (2018): 411–14. http://dx.doi.org/10.1007/s11623-018-0969-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity certification"

1

Брайко, Б. В., та B. V. Braiko. "Професійна підготовка магістрів з кібербезпеки в університетах Великої Британії". Дисертація, Хмельницький національний університет, 2019. http://elar.khnu.km.ua/jspui/handle/123456789/10229.

Full text
Abstract:
У дисертації здійснено цілісний порівняльний аналіз професійної підготовки майбутніх магістрів з кібербезпеки в університетах Великої Британії з метою запозичення прогресивних ідей досвіду для впровадження окремих його елементів у вітчизняну освітню практику. Обґрунтування нових концептуальних підходів до вдосконалення професійної підготовки магістрів з кібербезпеки потребує в контексті інтеграції України до європейського освітньо-інформаційного простору ретельної уваги до результатів наукових пошуків і прогностичних ідей зарубіжного досвіду, зокрема Великої Британії. Схарактеризовано стан
APA, Harvard, Vancouver, ISO, and other styles
2

Gil, Filipa Cristina Pereira. "A implementação do Regulamento de Cibersegurança (Cybersecurity Act) e o seu impacto para cibersegurança." Master's thesis, 2021. http://hdl.handle.net/10071/24985.

Full text
Abstract:
A tecnologia tem um papel importante na nossa vida privada, nas empresas e nos Estados a nível global. Dependemos da tecnologia para comunicar, trabalhar, para as atividades sociais, saúde, energia, transportes e para inovar de forma mais ecológica. Desde 1985 que começaram a ser formuladas políticas e iniciativas europeias de cibersegurança, inicialmente como soluções para melhorar a economia, progressivamente, como uma forma de proteger as infraestruturas críticas, e com uma abordagem abrangente e coesa que envolve também cibercriminalidade, inovação tecnológica e ciberdefesa. Tendo em conta
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity certification"

1

Walker, Matt, Fernando J. Maymi, and Brent Earl Chapman. CompTIA CSA+ Cybersecurity Analyst Certification. McGraw-Hill Education, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maymi, Fernando, Jeff T. Parker, and Brent Chapman. CompTIA CySA+ Cybersecurity Analyst Certification Bundle. McGraw-Hill Education, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams. McGraw-Hill Education, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. IT Governance Ltd, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Voice), Maxwell (Male Synthesized. Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. de Gruyter GmbH, Walter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

CCNA Cybersecurity Operations Course Booklet. Cisco Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rogers, Bobby E. CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002). McGraw-Hill Education, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maymi, Fernando, Brent Chapman, and Kelly Sparks. CompTIA CySA+ Cybersecurity Analyst Certification Bundle (Exam CS0-002). McGraw-Hill Education, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Academy, Cisco Networking. CCNA Cybersecurity Operations Companion Guide. Cisco Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

CompTIA Cybersecurity Analyst Cert Guide. Pearson IT Certification, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity certification"

1

Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hübner. "Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs." In Cybersecurity Teaching in Higher Education. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-24216-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ping, and Hubert D’Cruze. "Cybersecurity Certification: Certified Information Systems Security Professional (CISSP)." In 16th International Conference on Information Technology-New Generations (ITNG 2019). Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-14070-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hozza, David. "Entering the Cybersecurity Workforce: Certification vs. College Degree." In Innovative Practices in Teaching Information Sciences and Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61290-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fenton, Demitrius, Terry Traylor, Guy Hokanson, and Jeremy Straub. "Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs." In The Challenges of the Digital Transformation in Education. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11935-5_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Acosta, Mauricio Alexander Nieto, and Hamid Jahankhani. "An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nijdam, Niels A., Meriem Benyahya, and Anastasija Collen. "Cybersecurity and Data Privacy: Stakeholders’ Stand on Regulations and Standards." In Contributions to Management Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61681-5_6.

Full text
Abstract:
AbstractAVENUE’s technological interest lies in those state-of-the-art technologies and solutions that either are already commercial or close to the market and are expected to reach commercialisation within the following years. For the successful implementation of the project activities, a wide range of technological as well as non-technological elements will be employed, adapted, integrated, and, where required, partially developed. The present chapter focuses on those connected automated vehicle (CAV) technologies from the perspective of cybersecurity, delving into questions on in-vehicle, b
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Adrian. "The Role of Cybersecurity Certifications." In Cybersecurity Education for Awareness and Compliance. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7847-5.ch012.

Full text
Abstract:
The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the vario
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Adrian. "The Role of Cybersecurity Certifications." In Research Anthology on Advancements in Cybersecurity Education. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3554-0.ch005.

Full text
Abstract:
The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the vario
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." In Research Anthology on Advancements in Cybersecurity Education. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3554-0.ch006.

Full text
Abstract:
The workforce demand for cybersecurity professionals has been substantial and fast growing. Qualified cybersecurity professionals with appropriate knowledge, skills, and abilities for various tasks and job roles are needed to perform the challenging work of defending the cyber space. The certified information systems security professional (CISSP) certification is a globally recognized premier cybersecurity credential and validation of qualifications. This case study analyzes the CISSP certification requirements, domains and objectives and attempts to map them to the cybersecurity industry comp
APA, Harvard, Vancouver, ISO, and other styles
10

Matheu, Sara N., and Antonio F. Skarmeta. "10. Cybersecurity Certification in IoT Environments." In Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection. Now Publishers, 2020. http://dx.doi.org/10.1561/9781680836837.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity certification"

1

Kyranoudi, Pinelopi, Nineta Polemi, Paresh Rathod, Ricardo Gregorio Lugo, Sotiris Ioannidis, and Paulinus Ofem. "Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training." In 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC). IEEE, 2024. https://doi.org/10.1109/ice/itmc61926.2024.10794272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kallergis, Dimitrios, Theodoros Karvounidis, Kitty Kioskli, and Christos Douligeris. "Cybersecurity Certification for Professional Training: An Overview." In 2025 IEEE Global Engineering Education Conference (EDUCON). IEEE, 2025. https://doi.org/10.1109/educon62633.2025.11016633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sebastio, Stefano, Sreedevi Beena, Sara Matheu, Roland Atoui, and Antonio Skarmeta. "Bolstering Up Smart Products Cybersecurity (Re-)Certification with Manufacturer's Evidence." In 2025 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2025. https://doi.org/10.1109/smartcomp65954.2025.00085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cosic, Jasmin, Admir Jukan, and Miroslav Baca. "Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hubner. "Towards Cybersecurity MOOC Certification." In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2021. http://dx.doi.org/10.1109/eurospw54576.2021.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hovhannisyan, Kristine, Piotr Bogacki, Consuelo Assunta Colabuono, Domenico Lofu, Maria Vittoria Marabello, and Brady Eugene Maxwell. "Towards a Healthcare Cybersecurity Certification Scheme." In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021. http://dx.doi.org/10.1109/cybersa52016.2021.9478255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Karagiannis, Stylianos, Marco Manso, Emmanouil Magkos, Luis L. Ribeiro, and Luis Campos. "Automated and On-Demand Cybersecurity Certification." In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2021. http://dx.doi.org/10.1109/csr51186.2021.9527958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aljebur, Kaled, Mostfa Albdair, and Ron Addie. "Cybersecurity of a Fact Certification Network." In 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2022. http://dx.doi.org/10.1109/itnac55475.2022.9998426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oliveira, Andre da Silva, and Henrique Santos. "Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification." In 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, 2022. http://dx.doi.org/10.1109/drcn53993.2022.9758022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kyranoud, Pinelopi, Eleni Maria Kalogeraki, Alexandra Michota, and Nineta Polemi. "Cybersecurity Certification Requirements for Supply Chain Services." In 2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2021. http://dx.doi.org/10.1109/iscc53001.2021.9631467.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity certification"

1

Hupp, William, Danish Saleem, Jordan Peterson, and Kenneth Boyce. Cybersecurity Certification Recommendations for Interconnected Grid Edge Devices and Inverter Based Resources. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1832209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chhaya, Sunil. Cybersecurity Platform and Certification Framework Development for Extreme Fast Charging (XFC)-Integrated Charging Ecosystem. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1973254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chhaya, Sunil. Cybersecurity Platform and Certification Framework Development for Extreme Fast Charging (XFC)-Integrated Charging Ecosystem. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1974448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Perlow, Jason, and Stephen Hendrick. 2023 State of Tech Talent Report: Acquiring and Retaining Technical Talent in 2023. The Linux Foundation, 2023. https://doi.org/10.70828/dvre8960.

Full text
Abstract:
Linux Foundation Research partnered with LF Training and Certification for its annual talent report, this time from the perspective of hiring managers. As we enter a period of economic uncertainty, this report assesses the current state of technology talent acquisition and retention around the world, illuminating what has been and will continue to be impacted when it comes to hiring for technical roles. Findings from the survey communicate growing interest in upskilling, training, and pre-employment certification as hiring priorities shift and there is increased pressure to place the right tal
APA, Harvard, Vancouver, ISO, and other styles
5

Lawson, Adrienn. 2024 State of Tech Talent Report: Survey-based Insights into the Current State of Technical Talent Acquisition, Retention, and Management Globally. The Linux Foundation, 2024. https://doi.org/10.70828/lejn2246.

Full text
Abstract:
LF Research and LF Training &amp; Certification partnered again this year to study trends in the technical talent market, surveying individuals responsible for hiring and training IT professionals. The aim of this research was to understand how technical skill development and organizational strategies are changing in response to emerging technologies and economic challenges, in particular the IT layoffs in 2023 and the growing use of generative AI tools. Key findings from the report indicate that despite headlines, only a minority of companies reduced their technical headcount in 2023. What's
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!