{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:02:02Z","timestamp":1749096122310,"version":"3.41.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["101158555"],"award-info":[{"award-number":["101158555"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016633","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Certification for Professional Training: An Overview"],"prefix":"10.1109","author":[{"given":"Dimitrios","family":"Kallergis","sequence":"first","affiliation":[{"name":"University of West Attica,Dept. of Informatics &#x0026; Computer Engineering,Attica,Greece"}]},{"given":"Theodoros","family":"Karvounidis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Dept. of Informatics,Piraeus,Greece"}]},{"given":"Kitty","family":"Kioskli","sequence":"additional","affiliation":[{"name":"trustilio BV,Amsterdam,The Netherlands"}]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[{"name":"University of Piraeus,Dept. of Informatics,Piraeus,Greece"}]}],"member":"263","reference":[{"journal-title":"The cybersecurity workforce gap","year":"2019","author":"Lewis","key":"ref1"},{"issue":"2","key":"ref2","first-page":"32","article-title":"Closing the Cybersecurity Skills Gap","volume":"4","author":"Vogel","year":"2023","journal-title":"Salus Journal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ice\/itmc61926.2024.10794272"},{"article-title":"Mind This Gap: Criminal Hacking and the Global Cybersecurity Skills Shortage, a Critical Analysis","volume-title":"the proceedings of Virus Bulletin Conference","author":"Cobb","key":"ref4"},{"issue":"1","key":"ref5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4018\/IJHIoT.2018010104","article-title":"The Cyber Talent Gap and Cybersecurity Professionalizing","volume":"2","author":"Nobles","year":"2018","journal-title":"International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)"},{"journal-title":"A Framework for Cybersecurity Gap Analysis in Higher Education, Southern Association for Information Systems (SAIS) Proceedings","author":"Kreider","key":"ref6"},{"issue":"2","key":"ref7","first-page":"101","article-title":"Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance","volume":"28","author":"Knapp","year":"2017","journal-title":"Journal of Information Systems Education"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32628\/cseit2410297"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2020.3037845"},{"journal-title":"ISO\/IEC standard 2016-12","article-title":"ISO\/IEC 17021-1:2015 Conformity assessment \u2014 Requirements for bodies providing audit and certification of management systems","year":"2015","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.19107\/ijisc.2023.02.04"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79976-2_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2172\/1825671"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102080"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3635059.3635097"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01239-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.54941\/ahfe1003723"},{"issue":"3","key":"ref18","article-title":"The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union?","volume":"7","author":"Spanou","year":"2024","journal-title":"the Cyber Security: A Peer-Reviewed Journal"},{"journal-title":"Directive on security of network and information systems","year":"2020","key":"ref19"},{"journal-title":"The European Cybersecurity Competence Centre (ECCC)","year":"2024","key":"ref20"},{"journal-title":"Digital Education Action Plan","first-page":"2021","year":"2023","key":"ref21"},{"journal-title":"European Cybersecurity Month ((ECSM)","year":"2024","key":"ref22"},{"journal-title":"European Skills Agenda","year":"2024","key":"ref23"},{"journal-title":"European Cybersecurity Skills Framework (ECSF)","year":"2022","key":"ref24"},{"journal-title":"Proposed Regulation amending Regulation (EU) 2019\/881 as regards managed security services","year":"2023","key":"ref25"},{"journal-title":"Recommendation on a European approach to micro-credentials for lifelong learning and employability","year":"2022","key":"ref26"},{"journal-title":"GUIDE TO DESIGN, ISSUE AND RECOGNISE MICRO-CREDENTIALS","year":"2022","key":"ref27"},{"journal-title":"Recommendations and Guidelines on Micro-Credentials","year":"2023","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2021.3127845"},{"journal-title":"Deliverable 3.2: CyberSecPro Cybersecurity Certification Schema Proposal","year":"2023","key":"ref30"},{"journal-title":"Cybersecurity Skills Academy","year":"2025","key":"ref31"},{"journal-title":"Cyber Resilience Act","year":"2025","key":"ref32"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2025,4,22]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016633.pdf?arnumber=11016633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:09:34Z","timestamp":1749013774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016633","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}