Порівняльний аналіз стратегій побудови другого та третього рівня освітніх програм зі спеціальності 125 "Кібербезпека"

Аналіз стратегій побудови навчальних програм для другого та третього освітнього рівня для спеціальностей, пов’язаних з інформаційними технологіями, інформаційною та кібербезпекою. Рекомендації для гармонізації процесу навчання та міжнародних стандартів.

Рубрика Педагогика
Вид статья
Язык украинский
Дата добавления 20.12.2023
Размер файла 292,2 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

43 Соколов, В., Курбанмурадов Д. (2018). Методика протидії соціальному інжинірингу на об'єктах інформаційної діяльності. Кібербезпека: освіта, наука, техніка, 1, 6-16. https://doi.org/10.28925/2663-4023.2018.L616

44 Marusenko, R., Sokolov, V., Buriachok, V. (2020). Experimental Evaluation of Phishing Attack on High School Students. Advances in Computer Science for Engineering and Education III, 1247, 668-680. https://doi.org/10.1007/978-3-030-55506-1_59

45 Marusenko, R., Sokolov, V., Bogachuk, I. (2022). Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation. Advances in Artificial Systems for Logistics Engineering, 135, 583-594. https://doi.org/10.1007/978-3-031-04809-8_53

46 Vyshnivskyi, V., Sokolov, V. (2018). Laboratory Complex “Cyber Range”. Сучасний захист інформації, 2, 105-107.

47 CDIO office (2019). Ініціатива CDIO (В. Соколов, Пер.). КУБГ. http://www.cdio.org/files/CDIO_standards_ua.pdf

48 Delhij, A., van Solingen, R., Wijnands, W. (2019). Керівництво по eduScrum : «Правила гри» (В. Соколов, пер.). КУБГ.

49 Buriachok, V., Sokolov, V. (2019). Implementation of Active Learning in the Master's Program on Cybersecurity. Advances in Computer Science for Engineering and Education II, 938, 610-624. https://doi.org/10.1007/978-3-030-16621-2_57

50 Buriachok, V, et al. (2023). Implementation of Active Cybersecurity Education in Ukrainian Higher School. Lecture Notes on Data Engineering and Communications Technologie, 178, 533-551. https://doi.org/10.1007/978-3-031-35467-0_32

51 Бурячок, B., Шевченко, С., Складанний, П. (2018). Віртуальна лабораторія для моделювання процесів в інформаційній та кібербезпеці як засіб формування практичних навичок студентів. Кібербезпека: освіта, наука, техніка, 2(2), 98-104. https://doi.org/10.28925/2663-4023.2018.2.98104 ISSN 2663 - 4023

Volodymyr Y. Sokolov

Ph.D., associate professor associate professor of Volodymyr Buriachok Department of Information and Cybersecurity Borys Grinchenko Kyiv University, Kyiv, Ukraine

Pavlo M. Skladannyi

Ph.D., associate professor head of Volodymyr Buriachok Department of Information and Cyber Security Borys Grinchenko Kyiv University, Kyiv, Ukraine

COMPARATIVE ANALYSIS OF STRATEGIES FOR BUILDING SECOND AND THIRD LEVEL OF 125 “CYBER SECURITY” EDUCATIONAL PROGRAMS

Abstract. The article analyzes the global market for the provision of educational services in the field of information security and cybersecurity. The study aims to compare strategies for building curricula for the second and third levels of education for specialties related to information technology, information, and cybersecurity, as well as to formulate recommendations for harmonizing the learning process and international standards. Cybersecurity training programs are becoming outdated too quickly. ISO standards are updated approximately every four years. Als o, the standard for the specialty 125 “Cybersecurity” for the third educational level still needs to be finalized. There is a problem of forming a consistent process of introducing the latest approaches and practices into the curriculum. The growth of the information technology market is leading to an increase in the need for cybersecurity specialists. Two processes are taking place simultaneously: the transition from practical skills to fundamental knowledge and vice versa. The most successful higher education institutions are those that can combine both approaches simultaneously. But this requires an experimental base, practical training laboratories, and a staff of teachers and researchers.

Only large institutions can perform this task. Since cybersecurity challenges are constantly changing, higher education institutions are required to improve their programs annually. Simultaneously with the process of updating teaching approaches, the body of international and industry standards, as well as various best practices and frameworks, are being improved. Rapid change requires not only continuous improvement from educators but also from cybersecurity practitioners. Thus, the process of continuous learning should continue after the formal completion of a master's or Ph.D. program.

The results of this study show that only a comprehensive development of information security skills allows for high-quality training of specialists. Based on this, the requirements for the educational standard for training specialists and scientists are presented.

Keywords: cyber security; informational security; IS; information technology; IT; information protection; vulnerabilities; learning process; educational standard.

Размещено на Allbest.ru

...

Подобные документы

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.