{"id":2123,"date":"2019-04-10T22:22:45","date_gmt":"2019-04-10T19:22:45","guid":{"rendered":"https:\/\/kaf44.mephi.ru\/?p=2123"},"modified":"2024-04-10T22:38:57","modified_gmt":"2024-04-10T19:38:57","slug":"%d0%bf%d0%be%d0%bb%d1%83%d1%87%d0%b5%d0%bd%d0%b8%d0%b5-%d1%81%d1%82%d0%b5%d0%bf%d0%b5%d0%bd%d0%b8-phd-in-cybersecurity-uk-%d0%bc%d0%b8%d0%bb%d0%be%d1%81%d0%bb%d0%b0%d0%b2%d1%81%d0%ba%d0%be%d0%b9","status":"publish","type":"post","link":"https:\/\/kaf44.mephi.ru\/?p=2123","title":{"rendered":"\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 PhD in Cybersecurity (UK) \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413."},"content":{"rendered":"\n<p>4 \u0430\u043f\u0440\u0435\u043b\u044f 2019 \u0433. \u0432 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0435 \u041f\u043b\u0438\u043c\u0443\u0442\u0430 (\u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u044f) (Plymouth University, School of Computing, Electronics and Mathematics, Faculty of Science and Engineering) \u0441\u043e\u0441\u0442\u043e\u044f\u043b\u0430\u0441\u044c \u0437\u0430\u0449\u0438\u0442\u0430 \u0434\u0438\u0441\u0441\u0435\u0440\u0442\u0430\u0446\u0438\u0438 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d\u0430\u0442\u0430\u043b\u044c\u0438 \u0413\u0435\u043e\u0440\u0433\u0438\u0435\u0432\u043d\u044b \u043d\u0430 \u0442\u0435\u043c\u0443 &#8220;Network Security Intelligence<strong> <\/strong>Centers for Information Security Incident Management&#8221; \u043d\u0430 \u0441\u043e\u0438\u0441\u043a\u0430\u043d\u0438\u0435 \u0443\u0447\u0435\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0414\u043e\u043a\u0442\u043e\u0440\u0430 \u0444\u0438\u043b\u043e\u0441\u043e\u0444\u0438\u0438 \u0432 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (PhD in Cybersecurity).<\/p>\n\n\n\n<p>\u041d\u0430\u0443\u0447\u043d\u044b\u0439 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. &#8211; \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u043e\u0440 Steven Furnell.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1000\" height=\"750\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9401-small.jpg\" alt=\"\" class=\"wp-image-2124\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9401-small.jpg 1000w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9401-small-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9401-small-768x576.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1000\" height=\"750\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9763-small.jpg\" alt=\"\" class=\"wp-image-2125\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9763-small.jpg 1000w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9763-small-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2024\/04\/IMG_9763-small-768x576.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>\u0413\u043e\u0440\u0434\u0438\u043c\u0441\u044f \u0438 \u043f\u043e\u0437\u0434\u0440\u0430\u0432\u043b\u044f\u0435\u043c \u041d\u0430\u0442\u0430\u043b\u044c\u044e \u0413\u0435\u043e\u0440\u0433\u0438\u0435\u0432\u043d\u0443 \u0441 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u0438\u0435\u043c \u0435\u0435 \u0432\u043a\u043b\u0430\u0434\u0430 \u0432 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0442\u0430\u043a\u043e\u0439 \u0432\u0430\u0436\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 \u043a\u0430\u043a \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438!<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>\u0416\u0435\u043b\u0430\u0435\u043c \u0435\u0439 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u0438\u044f \u0438 \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0441\u0442\u043e\u0440\u0430\u0445!<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4 \u0430\u043f\u0440\u0435\u043b\u044f 2019 \u0433. \u0432 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0435 \u041f\u043b\u0438\u043c\u0443\u0442\u0430 (\u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u044f) (Plymouth University, School of Computing, Electronics and Mathematics, Faculty of Science and Engineering) \u0441\u043e\u0441\u0442\u043e\u044f\u043b\u0430\u0441\u044c \u0437\u0430\u0449\u0438\u0442\u0430 \u0434\u0438\u0441\u0441\u0435\u0440\u0442\u0430\u0446\u0438\u0438 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d\u0430\u0442\u0430\u043b\u044c\u0438 \u0413\u0435\u043e\u0440\u0433\u0438\u0435\u0432\u043d\u044b \u043d\u0430 \u0442\u0435\u043c\u0443 &#8220;Network Security Intelligence Centers for Information Security Incident Management&#8221; \u043d\u0430 \u0441\u043e\u0438\u0441\u043a\u0430\u043d\u0438\u0435 \u0443\u0447\u0435\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0414\u043e\u043a\u0442\u043e\u0440\u0430 \u0444\u0438\u043b\u043e\u0441\u043e\u0444\u0438\u0438 \u0432 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (PhD in Cybersecurity). \u041d\u0430\u0443\u0447\u043d\u044b\u0439 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. &#8211; \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u043e\u0440 &#8230; <a title=\"\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 PhD in Cybersecurity (UK) \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413.\" class=\"read-more\" href=\"https:\/\/kaf44.mephi.ru\/?p=2123\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2123"}],"collection":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2123"}],"version-history":[{"count":1,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2123\/revisions"}],"predecessor-version":[{"id":2126,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2123\/revisions\/2126"}],"wp:attachment":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}