1. CheckPoint Corporation https://resources.checkpoint.com/cyber-security-resources/2022-cyber-security-report(accessed 04.05.2023) CheckPoint Corporation https://resources.checkpoint.com/cyber-security-resources/2022-cyber-security-report(accessed 04.05.2023)
2. (ISC)2. 2021. (ISC)2 Cybersecurity Workforce Study https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx (accessed 04.05.2023) (ISC)2. 2021. (ISC)2 Cybersecurity Workforce Study https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx (accessed 04.05.2023)
3. Europe council decision 765/2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93 Europe council decision 765/2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93
4. Computer Science Curricula 2013 , Association for Computing Machinery ( ACM) IEEE Computer Society https://www.acm.org/binaries/content/assets/education/cs 2013 _web_final.pdf (accessed 04.05.2023) Computer Science Curricula 2013, Association for Computing Machinery (ACM) IEEE Computer Society https://www.acm.org/binaries/content/assets/education/cs2013_web_final.pdf (accessed 04.05.2023)
5. ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001 .pdf (accessed 04 .05.2023) ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001.pdf (accessed 04.05.2023)