PART II

Cybersecurity Training

In PART II, we combine cybersecurity project management and related best practices (e.g., PMBOK® Guide, ITIL, ISO risk and quality management, and the NIST Cybersecurity Framework) with training best practices (e.g., ADDIE Model of Instructional Design, Bloom’s Taxonomy, and Kirkpatrick Model of Evaluation). We observed when organizations bring together best practices (combining) and choose the elements to fit their unique training project (tailoring), as outlined in Cybersecurity Training, organizations improve the probability of learning success while keeping risks low.

ITIL Project Management and Training

We align all technology training (including cybersecurity) with the ITIL (Information Technology Infrastructure ...

Get Cybersecurity Training now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.