Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!
You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!
Instruction
15.4.1. Description of the Training Programme
Introduction
This section describes the implementation of our educational method within the THREAT-ARREST platform, as applied to a real case in a smart shipping organization. The program preparation and evaluation consist of eight main phases:
Description of the training program
Learning outcomes of the training module
Teaching and learning strategies
Student participation
Overview of a...