Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes Course (How To)

via Treehouse

Overview

In this chapter, the focus is on cybersecurity training and the continuous adaptation of training programs, emphasizing the need for dynamic, model-driven educational frameworks that integrate pedagogical best practices with security threat models. The chapter outlines a detailed methodology for designing, implementing, and assessing cybersecurity training—illustrated through a smart shipping use case—and demonstrates how platforms like THREAT-ARREST can tailor training to specific organizational needs while continuously monitoring and improving trainee performance.

Syllabus

15.2. Materials and Methods

In this stage, the chapter introduces the foundational principles and tools used to develop and evaluate cybersecurity training programs in the context of the 4th Industrial Revolution. It explains how modern training methodologies—grounded in pedagogical theories like Bloom's taxonomy, Kolb's learning cycle, and Constructive Alignment—are integrated with security models such as STRIDE, all implemented on the THREAT-ARREST cyber-ranges platform.

Chevron 7 steps
  • instruction

    15.1. Introduction

  • instruction

    15.2.1. Modern Cyber-Security Training Platforms

  • instruction

    15.2.2. Teaching Cyber-Security

  • instruction

    15.2.3. The Building-Blocks of the THREAT-ARREST Cyber-Security Training Framework

  • Quiz 15.2

    5 questions

  • instruction

    15.3. Results: Modelling of the Learning Process

  • Quiz 15.3

    5 questions

15.4. The Smart Shipping Use Case

In this stage, the chapter presents a real-world application of the training framework tailored for a smart shipping organization. It describes the pilot system's architecture, the specific training modules designed for different user roles (on-board and shore-side personnel), and the assessment and feedback mechanisms used to evaluate and continuously improve security awareness and skills.

Chevron 9 steps
  • instruction

    15.4.1. Description of the Training Programme

  • instruction

    15.4.2. Learning Outcome of the Training Module

  • instruction

    15.4.3. Teaching and Learning Strategies

  • instruction

    15.4.4. Student Participation

  • instruction

    15.4.5. Overview of Assessments and Training Levels

  • instruction

    15.4.6. Study Plan (Learning Schedule)

  • instruction

    15.4.7. Resources Required to Complete the Training

  • instruction

    15.4.8. Benchmarking of the Module

  • Quiz 15.4

    5 questions

Reviews

Start your review of (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.