In this chapter, the focus is on cybersecurity training and the continuous adaptation of training programs, emphasizing the need for dynamic, model-driven educational frameworks that integrate pedagogical best practices with security threat models. The chapter outlines a detailed methodology for designing, implementing, and assessing cybersecurity training—illustrated through a smart shipping use case—and demonstrates how platforms like THREAT-ARREST can tailor training to specific organizational needs while continuously monitoring and improving trainee performance.
(UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes Course (How To)
via Treehouse
Overview
Syllabus
15.2. Materials and Methods
In this stage, the chapter introduces the foundational principles and tools used to develop and evaluate cybersecurity training programs in the context of the 4th Industrial Revolution. It explains how modern training methodologies—grounded in pedagogical theories like Bloom's taxonomy, Kolb's learning cycle, and Constructive Alignment—are integrated with security models such as STRIDE, all implemented on the THREAT-ARREST cyber-ranges platform.
Chevron 7 steps- instruction
15.1. Introduction
- instruction
15.2.1. Modern Cyber-Security Training Platforms
- instruction
15.2.2. Teaching Cyber-Security
- instruction
15.2.3. The Building-Blocks of the THREAT-ARREST Cyber-Security Training Framework
-
Quiz 15.2
5 questions
- instruction
15.3. Results: Modelling of the Learning Process
-
Quiz 15.3
5 questions
15.4. The Smart Shipping Use Case
In this stage, the chapter presents a real-world application of the training framework tailored for a smart shipping organization. It describes the pilot system's architecture, the specific training modules designed for different user roles (on-board and shore-side personnel), and the assessment and feedback mechanisms used to evaluate and continuously improve security awareness and skills.
Chevron 9 steps- instruction
15.4.1. Description of the Training Programme
- instruction
15.4.2. Learning Outcome of the Training Module
- instruction
15.4.3. Teaching and Learning Strategies
- instruction
15.4.4. Student Participation
- instruction
15.4.5. Overview of Assessments and Training Levels
- instruction
15.4.6. Study Plan (Learning Schedule)
- instruction
15.4.7. Resources Required to Complete the Training
- instruction
15.4.8. Benchmarking of the Module
-
Quiz 15.4
5 questions