Abstract

Abstract. Introduction. The article analyzes the formation and development of cyber education in Ukraine and in the world. The problematic issues of the formation of the system, content and methodologies of cyber-education in Ukraine are revealed. An option for implementing an integrated and continuous education system on cybersecurity has been developed.Purpose. Formation of a methodology, system and content of training on cybersecurity issues (cyber education) in educational institutions of Ukraine.Methods. Theoretical analysis, synthesis, comparison, generalization and forecastingResults. To systematize and improve training in cybersecurity, the authors developed an option for implementing an education system on cybersecurity. It includes all levels of education from school to higher and postgraduate. At the same time, a gradual and continuous formation of knowledge and competence in cybersecurity necessary for the modern information society is envisaged. Particular attention is paid to the formation of these knowledge and competences in higher education institutions of the security and defense sector of Ukraine. An integral, consistent, interconnected and continuous system of training in cyber security and cyber defense at the tactical, operational and strategic levels of training, as well as the content of training for their implementation, has been proposed and practically tested.Conclusion. The proposed system of education on cybersecurity is a comprehensive and flexible solution to the problem question of educating the society and personality on cybersecurity directions. Education on cybersecurity will begin with pre-school education and reduce the risks for children at the stage of their formation as a person. The proposed system for training specialists of the National Security and Defense Sector of Ukraine will enable the formation and support of graduates' competence in cybersecurity and cyber defense for the purpose of performing assigned tasks in the context of the transfer of hostilities to information and cybernetic space.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.