Abstract: Information Security (IS) specialists ’ training for all sectors of trade, industry and government has never been more important as intellectual property and other sensitive or business-critical information becomes the life-blood of many companies today. Analysis of the experience collected within training of IS specialists at the Moscow Engineering Physics Institute (State University) (the MEPhI) at the Information Security Faculty allows forming the basic requirements to the level of their preparation. To form such requirements it is expedient to take a look at the types and tasks of professional activity of the graduates and to formulate their qualification characteristics. This paper formulates these characteristics on the bas...
The problem of professional training of skilled human personnel in the industry of information comm...
Part 1: WISE 8International audienceThe experience of preparing for the "Business Continuity and Inf...
Information security is intended to protect the confidentiality, integrity and availability of infor...
The diploma assignment discusses Information Technology Security according to standards ISO/IEC 2700...
Part 2: Innovation in CurriculaInternational audienceThe research results of competencies and compet...
The paper discusses the use of information technologies in professional training of future security ...
Worldwide there is a lack of well-educated and experienced information security specialists. The fir...
The article is devoted to the training of specialists in the field of information security of the pe...
The paper discusses the development and testing of a model of competencies in information security w...
The problem of professional training of skilled human personnel in the industry of information commu...
With the increasing significance of information technology, there is an urgent need for adequate mea...
The problem of professional training of skilled human personnel in the industry of information commu...
The requirements for training in the field of information security (IS) in terms of IS management as...
In the article the condition and problems of vocational training of experts on information security ...
The relevance of this study is predetermined by the intensification of the introduction of informati...
The problem of professional training of skilled human personnel in the industry of information comm...
Part 1: WISE 8International audienceThe experience of preparing for the "Business Continuity and Inf...
Information security is intended to protect the confidentiality, integrity and availability of infor...
The diploma assignment discusses Information Technology Security according to standards ISO/IEC 2700...
Part 2: Innovation in CurriculaInternational audienceThe research results of competencies and compet...
The paper discusses the use of information technologies in professional training of future security ...
Worldwide there is a lack of well-educated and experienced information security specialists. The fir...
The article is devoted to the training of specialists in the field of information security of the pe...
The paper discusses the development and testing of a model of competencies in information security w...
The problem of professional training of skilled human personnel in the industry of information commu...
With the increasing significance of information technology, there is an urgent need for adequate mea...
The problem of professional training of skilled human personnel in the industry of information commu...
The requirements for training in the field of information security (IS) in terms of IS management as...
In the article the condition and problems of vocational training of experts on information security ...
The relevance of this study is predetermined by the intensification of the introduction of informati...
The problem of professional training of skilled human personnel in the industry of information comm...
Part 1: WISE 8International audienceThe experience of preparing for the "Business Continuity and Inf...
Information security is intended to protect the confidentiality, integrity and availability of infor...