students to be competent practitioners. Most young
professionals, recent students, are forced to build their
careers relying on more mature colleagues' self-
education and experience. At the same time,
universities, in general, cannot produce job-ready
graduates.
According to IS professionals, a cognitive
revolution is needed to overcome the cognitive crisis,
and three things need to happen:
1. Everyone should thoroughly understand the
essence and peculiarities of the processes based on
the study's study.
2. Experts need to develop replicable learning
methods and techniques.
3. Educators should promote and develop
students' practical thinking.
As noted above, cyber education has great
potential to shape the practical experience for future
IS specialists. Today, there is some international
experience in integrating cybersecurity exercises into
the educational process.
For example, presenting 20 years of experience in
integrating large-scale cyber defense exercises into
the computer science and information technology
curriculum at the United States Military Academy,
the authors (Petullo et al., 2016) emphasize that such
integration is based on The Cyber-Defense Exercise
(CDX), which takes place once a year and lasts for
four days (13 hours each day). Students are excused
from other classes during this period. Students' main
challenge in CDX is to design, build, and protect an
objectively complex network that students
themselves have not yet encountered during their time
at the academy.
The authors agree with a number of criticisms of
CDX. Still, they are convinced that, with the right use
of resources, events such as CDX provide a useful
educational experience with a well-designed strategy.
It should be noted that CDX is an optional
educational activity involving only a select group of
students, predominantly computer science and
information technology majors. In addition - these are
students, usually in their final year of study. Another
special feature is that the CDF requires
interdisciplinary knowledge and takes place under a
systems engineering course umbrella.
The United States Military Academy also has a
long history of students participating in Capture The
Flag (CTF) competitions. Unlike CDX, where the
training is aimed solely at defense, CTF competitions,
as a rule, may emphasize defense, or - on the attack,
or both of the attack and defense.
It should be noted that the CTF format is the most
widely integrated cyberlearning into the learning
process. The authors of many publications argue that
cybersecurity skills should be developed not only
through conventional methods and forms, such as
lectures, seminars, and labs, but also through more
active methods with a practical orientation
(Mansurov, 2016; Minzov et al., 2019; Vykopal et al.,
2017).
Simultaneously, teachers see some limitations for
implementing CTF cyberlearning into the educational
process, considering only such opportunities as the
organization of masterclasses, specialized lecture
classes on the most complex topics to prepare
students for competitions (Mansurov from his article
can be added). According to the author, these
limitations are due to the rigid structure of the
curriculum and insufficient hours devoted to
mastering the most significant (from a cybersecurity
point of view) disciplines. Here again, we can state
that higher-level cybersecurity competency building
is optional and does not focus on each student.
Highlighting the experience accumulated at the
Faculty of Physics and Engineering of Altai State
University, A.V. Mansurov emphasizes that elective
classes deal with a dissected problem into its
components, and, at the first stage, for each selected
component, the knowledge and skills needed to
understand the essence and peculiarities of the
processes stated within the problem are identified.
The author considers it especially important to
develop reflection so that the learner can be fully
aware of what he already knows and what additional
knowledge he needs.
Some authors emphasize that the implementation
of gaming technologies in cybersecurity is hindered
by the fear of educational institutions' administration
to obtain through such training an unethical hacker
who can cause certain problems (Minzov et al., 2019).
Obviously, in this case, according to the authors,
the emphasis should be placed on mastering
technologies and methods of creating secure, fault-
tolerant IS, forming professional ethics. At the same
time, among the educational technologies, the
combination of such didactic technologies as a game,
role-playing, and problem-based is proved to be
effective. This is exactly the combination that
characterizes CTF format competitions.
At the same time, it is proposed to use the time of
independent training (following the FSES - 50% of
the total curriculum), summer schools, and other
forms of extracurricular activities to prepare and
conduct competitions. Once again, it is about the lack
of systematic and optional integration of cyber studies
into the training of cybersecurity specialists.
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security
158