Principles of Construction and Experience of Implementation of the Training Course
Applied Issues of Information Security
Abstract
The article describes the target skills of the "Applied Information Security Issues" training course in terms of the international standard for digital skills SFIA 7 and the course content by topic with a brief description. The expected learning outcomes for each topic are formulated and the skills developed with the corresponding topic are indicated. The emphasis in this course is made on the disclosure of issues related to ensuring reliable information security of organizations, in particular, on the development of skills such as: digital forensics, corporate information security and information support of the organization. The article actually substantiates the innovative value of such a course, since now in specialized universities there is little educational material on digital forensics. The importance of this knowledge for future representatives of the ICT industry cannot be overemphasized, as well as the skills of a strategic approach to ensuring the information security of an entire enterprise. The article also provides an assessment of the experience of implementing the first of these training courses, which was successfully delivered in spring 2020. At present, the authors of the article continue to teach the training course "Applied Issues of Information Security" for graduate students of the Faculty of Computational Mathematics and Cybernetics, Lomonosov Moscow State University.
References
[2] Sukhomlin V.A., Belyakova O.S., Klimina A.S., Polyanskaya M.S., Rusanov A.A. Cybersecurity Digital Skills Model 2020. Sovremennye informacionnye tehnologii i IT-obrazovanie = Modern Information Technologies and IT-Education. 2020; 16(3):695-710. (In Russ., abstract in Eng.) DOI: https://doi.org/10.25559/SITITO.16.202003.695-710
[3] Sukhomlin V.A., Zubareva E.V., Namiot D.E., Yakushin A.V. Sistema razvitija cifrovyh navykov VMK MGU & Bazal't SPO. Metodika klassifikacii i opisanija trebovanij k sotrudnikam i soderzhaniju obrazovatel'nyh programm v sfere informacionnyh tehnologij [System for the Development of Digital Skills of the CMC MSU & BaseALT]. MAKS Press: Basealt Publ., Moscow; 2020. (In Russ.)
[4] Joint Task Force on Cybersecurity Education. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Association for Computing Machinery, New York, NY, USA; 2018. (In Eng.) DOI: https://doi.org/10.1145/3184594
[5] Cyber2yr2020 Task Group. Cybersecurity Curricular Guidance for Associate-Degree Programs. Association for Computing Machinery, New York, NY, USA; 2020. (In Eng.) DOI: https://doi.org/10.1145/3381686
[6] Ackerman P.L. Individual differences and skill acquisition. In: Ackerman P.L., Sternberg R.J., Glaser R. (ed.) A series of books in psychology. Learning and individual differences: Advances in theory and research. W H Freeman/Times Books/ Henry Holt & Co; 1989. p. 165-217. (In Eng.)
[7] Conte S.D., Hamblen J.W., Kehl W.B., Navarro S.O., Rheinboldt W.C., Young D.M., Atchinson W.F. An undergraduate program in computer science - preliminary recommendations. Communications of the ACM. 1965; 8(9):543-552. (In Eng.) DOI: https://doi.org/10.1145/365559.366069
[8] Comer D.E., Gries D., Mulder M.C., Tucker A., Turner A.J., Young P.R., Denning P.J. Computing as a discipline. Communications of the ACM. 1989; 32(1):9-23. (In Eng.) DOI: https://doi.org/10.1145/63238.63239
[9] Blair J.R.S., Chewar C.M., Raj R.K., Sobiesk E. Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum. In: Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE '20). Association for Computing Machinery, New York, NY, USA; 2020. p. 82-88. (In Eng.) DOI: https://doi.org/10.1145/3341525.3387426
[10] Yarochkin V.I. Informacionnaya bezopasnost [Information Security]. 2nd ed. Academic Project, Gaudeamus Publ., Moscow; 2004. (In Russ.)
[11] Galatenko V.A. Osnovy informatsionnoy bezopasnosti [Fundamentals of Information Security]. 2nd ed. INTUIT, Moscow; 2016. (In Russ.)
[12] Isupova T.N., Perevozchikova M.S. Formation of competences in the field of information security while studying the discipline "Information Technologies and Information Security" by students of university. Herald of Humanitarian Education. 2017; (3):41-43. Available at: https://www.elibrary.ru/item.asp?id=30564145 (accessed 19.10.2020). (In Russ., abstract in Eng.)
[13] Gollmann D. Computer Security. John Wiley & Sons; 2011. (In Eng.)
[14] Parrish A., Impagliazzo J., Raj R.K., Santos H., Asghar M.R., Jøsang A., Pereira T., Sá V.J., Stavrou E. Global perspectives on cybersecurity education. In: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018). Association for Computing Machinery, New York, NY, USA; 2018. p. 340-341. (In Eng.) DOI: https://doi.org/10.1145/3197091.3205840
[15] Hawthorne E.K. Multifarious initiatives in cybersecurity education. ACM Inroads. 2013; 4(3):46-47. (In Eng.) DOI: https://doi.org/10.1145/2505990.2505999
[16] Cabaj K., Domingos D., Kotulski Z., Respício A. Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security. 2018; 75:24-35. (In Eng.) DOI: https://doi.org/10.1016/j.cose.2018.01.015
[17] Švábenský V., Čeleda P., Vykopal J., Brišáková S. Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security. 2021; 102:102154. (In Eng.) DOI: https://doi.org/10.1016/j.cose.2020.102154
[18] John S.N., Noma-Osaghae E., Oajide F., Okokpujie K. Cybersecurity Education: The Skills Gap, Hurdle! In: Daimi K., Francia III G. (ed.) Innovations in Cybersecurity Education. Springer, Cham; 2020. p. 361-376. (In Eng.) DOI: https://doi.org/10.1007/978-3-030-50244-7_18
[19] Wang P., Sbeit R. A Comprehensive Mentoring Model for Cybersecurity Education. In: Latifi S. (ed.) 17th International Conference on Information Technology-New Generations (ITNG 2020). Advances in Intelligent Systems and Computing. 2020; 1134:17-23. Springer, Cham. (In Eng.) DOI: https://doi.org/10.1007/978-3-030-43020-7_3
[20] Petrenko S., Makoveichuk K., Olifirov A. New Methods of the Cybersecurity Knowledge Management Analytics. In: Sukhomlin V., Zubareva E. (ed.) Convergent Cognitive Information Technologies. Convergent 2018. Communications in Computer and Information Science. 2020; 1140:296-310. Springer, Cham. (In Eng.) DOI: https://doi.org/10.1007/978-3-030-37436-5_27
[21] Karagiannis S., Magkos E., Ntantogian C., Ribeiro L.L. Sandboxing the Cyberspace for Cybersecurity Education and Learning. In: Boureanu I. et al. (ed.) Computer Security. ESORICS 2020. Lecture Notes in Computer Science. 2020; 12580:181-196. Springer, Cham. (In Eng.) DOI: https://doi.org/10.1007/978-3-030-66504-3_11
[22] Hay B., Dodge R., Nance K. Using Virtualization to Create and Deploy Computer Security Lab Exercises. In: Jajodia S., Samarati P., Cimato S. (ed.) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing. 2008; 278:621-635. Springer, Boston, MA. (In Eng.) DOI: https://doi.org/10.1007/978-0-387-09699-5_40
[23] Burley D.L. Cybersecurity education, part 2. ACM Inroads. 2015; 6(2):58. (In Eng.) DOI: https://doi.org/10.1145/2746407
[24] Baldassarre M.T., Barletta V.S., Caivano D., Raguseo D., Scalera M. Teaching cyber security: the hack-space integrated model. CEUR Workshop Proceedings. 2019; 2315:6. Available at: http://ceur-ws.org/Vol-2315/paper06.pdf (accessed 19.10.2020). (In Eng.)
[25] Du W. SEED: Hands-On Lab Exercises for Computer Security Education. IEEE Security & Privacy. 2011; 9(5):70-73. (In Eng.) DOI: https://doi.org/10.1109/MSP.2011.139

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.