• 0Shopping Cart
LTRM
  • Home
  • Events
  • Volumes
  • Masthead
  • Editorial Board
  • Search
  • Menu Menu

Cybersecurity Games: Building Tomorrow’s Workforce

$6.99

Categories: Articles, Cybersecurity
  • Description
  • Reviews (0)

Description

Cyber competitions are venues, both physical and online, where participants perform in closed environments to defend the assets of an Information Technology (IT) network. Like any competition, cyber competitions are both instructional and gratifying for its participants. Within the National Institute for Standards and Technology (NIST), the Competitions subgroup (NICEWG) set an objective in early 2016 to explore the concepts, design strategies, and pursue actions that advance the role that competitions play in cybersecurity education, training, and workforce development.

Reviews

There are no reviews yet.

Be the first to review “Cybersecurity Games: Building Tomorrow’s Workforce” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

  • A Democracy of Users

    $0.99
    Buy Article
  • Is Cyber Espionage a Form of Market Manipulation?

    $9.99
    Buy Article
  • Hunt: Securing the Commercial Sector Since 2013

    $4.99
    Buy Article
  • Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy

    $8.00
    Buy Article

Newsletter

Contact Us

Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

Privacy Policy

About

Sponsors
Membership

Submit

Articles
Notes
Symposium Proposals

Store

Lectures

Journals/Partners

  • Global Cyber Institute
  • Journal of Law & Cyber Warfare
  • Lexeprint Inc.

Lectures – Lexeprint.com

  • Lawyer’s Guide for Advising Board Members on Cybersecurity Risk Management
  • How Lawyers Can Help Clients Manage Vendors to Protect and Mitigate the Risks of a Cyber Incident
  • Exploring the Internet of Things: Implications for the Law and the Associated Risks
© Copyright - LTRM - Enfold Theme by Kriesi
Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to... Journal of Law and Cyber Warfare – Volume 3, Issue 1
Scroll to top