The Practical Requirements of a Malware Training Platform Tailored to Industry and Education

A Cameron, A Alam, QA Mirza - 2024 11th International …, 2024 - ieeexplore.ieee.org
Malware attacks continue to damage organisations and individuals. Whilst existing training
such as phishing training is useful to users, it's applicability to malware attacks is limited …

How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications

A Eipper, D Pöhn - arxiv preprint arxiv:2407.16238, 2024 - arxiv.org
Cyber attacks are ubiquitous and a constantly growing threat in the age of digitization. In
order to protect important data, developers and system administrators must be trained and …

A Critical Review of Cybersecurity Education in the United States

J Crabb, C Hundhausen, A Gebremedhin - Proceedings of the 55th ACM …, 2024 - dl.acm.org
This work examines the state-of-the-art of cybersecurity education in the United States by
considering two sources of data. The first source consists of Programs of Study for …