Association for information systems


Training and Certifications



Download 2,51 Mb.
Pdf ko'rish
bet66/85
Sana21.01.2022
Hajmi2,51 Mb.
#397811
1   ...   62   63   64   65   66   67   68   69   ...   85
Bog'liq
csec2017

5.3.2 Training and Certifications 
In the field of cybersecurity, knowledge acquisition and skill development at all post-
secondary levels occurs in both formal higher education settings and in the professional 
development, training, and certification space. Academic program developers should 
identify and connect with training providers in order to identify opportunities for 
collaboration. 
5.4 Workforce Frameworks 
Within the context of the larger economic environment, workforce development 
initiatives are often driven by workforce frameworks that provide an organizing structure 
for the various job roles; education, training and professional development requirements; 
and career pathways. In the field of cybersecurity, nations have begun to develop 
workforce frameworks to outline skill requirements and support workforce development 
initiatives. For instance, the U.S. National Initiative for Cybersecurity Education 
Cybersecurity Workforce Framework (NCWF)
17
 is being developed as a comprehensive 
resource to describe cybersecurity work. In Singapore, the National Cybersecurity 
Strategy calls for the development of a professional cybersecurity workforce through 
industry-oriented curricula at institutions of higher education, clear career pathways, and 
specific frameworks such as the Data Protection Competency Framework (DPCF) for 
data protection officers to ensure that they have the requisite skills, competencies and 
certifications required to effectively perform their duties
18
. In the United Kingdom, the 
National Cyber Security Strategy outlines how the UK government will support the 
development of a robust cybersecurity workforce
19
. These national strategies are 
illustrative of how governments around the world are developing workforce frameworks 
to support the growing need for cybersecurity professionals.  

Download 2,51 Mb.

Do'stlaringiz bilan baham:
1   ...   62   63   64   65   66   67   68   69   ...   85




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish