(UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes
47-minute College Credit Course
Start Course- College Credit
- Beginner
About this Course
In this chapter, the focus is on cybersecurity training and the continuous adaptation of training programs, emphasizing the need for dynamic, model-driven educational frameworks that integrate pedagogical best practices with security threat models. The chapter outlines a detailed methodology for designing, implementing, and assessing cybersecurity training—illustrated through a smart shipping use case—and demonstrates how platforms like THREAT-ARREST can tailor training to specific organizational needs while continuously monitoring and improving trainee performance.
15.2. Materials and Methods
In this stage, the chapter introduces the foundational principles and tools used to develop and evaluate cybersecurity training programs in the context of the 4th Industrial Revolution. It explains how modern training methodologies—grounded in pedagogical theories like Bloom's taxonomy, Kolb's learning cycle, and Constructive Alignment—are integrated with security models such as STRIDE, all implemented on the THREAT-ARREST cyber-ranges platform.
7 steps15.4. The Smart Shipping Use Case
In this stage, the chapter presents a real-world application of the training framework tailored for a smart shipping organization. It describes the pilot system's architecture, the specific training modules designed for different user roles (on-board and shore-side personnel), and the assessment and feedback mechanisms used to evaluate and continuously improve security awareness and skills.
9 steps-
15.4.1. Description of the Training Programme
-
15.4.2. Learning Outcome of the Training Module
-
15.4.3. Teaching and Learning Strategies
-
15.4.4. Student Participation
-
15.4.5. Overview of Assessments and Training Levels
-
15.4.6. Study Plan (Learning Schedule)
-
15.4.7. Resources Required to Complete the Training
-
15.4.8. Benchmarking of the Module
-
Quiz 15.4
5 questions