
students to be competent practitioners. Most young 
professionals, recent students, are forced to build their 
careers  relying  on  more  mature  colleagues'  self-
education  and  experience.  At  the  same  time, 
universities,  in  general,  cannot  produce  job-ready 
graduates. 
According  to  IS  professionals,  a  cognitive 
revolution is needed to overcome the cognitive crisis, 
and three things need to happen:  
1.  Everyone  should  thoroughly  understand  the 
essence and peculiarities of the processes based on 
the study's study. 
2.  Experts  need  to  develop  replicable  learning 
methods and techniques. 
3.  Educators  should  promote  and  develop 
students' practical thinking. 
As  noted  above,  cyber  education  has  great 
potential to shape the practical experience for future 
IS  specialists.  Today,  there  is  some  international 
experience in integrating cybersecurity exercises into 
the educational process. 
For example, presenting 20 years of experience in 
integrating  large-scale  cyber  defense  exercises  into 
the  computer  science  and  information  technology 
curriculum at  the United States  Military  Academy, 
the authors (Petullo et al., 2016) emphasize that such 
integration is based on The Cyber-Defense Exercise 
(CDX), which takes place once a year and lasts for 
four days (13 hours each day). Students are excused 
from other classes during this period. Students' main 
challenge in CDX is to design, build, and protect an 
objectively  complex  network  that  students 
themselves have not yet encountered during their time 
at the academy. 
The authors agree with a number of criticisms of 
CDX. Still, they are convinced that, with the right use 
of resources, events such as  CDX provide a useful 
educational experience with a well-designed strategy. 
It  should  be  noted  that  CDX  is  an  optional 
educational activity involving only a select group of 
students,  predominantly  computer  science  and 
information technology majors. In addition - these are 
students, usually in their final year of study. Another 
special  feature  is  that  the  CDF  requires 
interdisciplinary knowledge and takes place under a 
systems engineering course umbrella. 
The United States Military Academy also has a 
long history of students participating in Capture The 
Flag  (CTF)  competitions.  Unlike  CDX,  where  the 
training is aimed solely at defense, CTF competitions, 
as a rule, may emphasize defense, or - on the attack, 
or both of the attack and defense. 
It should be noted that the CTF format is the most 
widely  integrated  cyberlearning  into  the  learning 
process. The authors of many publications argue that 
cybersecurity  skills  should  be  developed  not  only 
through  conventional  methods  and  forms,  such  as 
lectures, seminars, and  labs, but also through more 
active  methods  with  a  practical  orientation 
(Mansurov, 2016; Minzov et al., 2019; Vykopal et al., 
2017). 
Simultaneously, teachers see some limitations for 
implementing CTF cyberlearning into the educational 
process,  considering only such opportunities as  the 
organization  of  masterclasses,  specialized  lecture 
classes  on  the  most  complex  topics  to  prepare 
students for competitions (Mansurov from his article 
can  be  added).  According  to  the  author,  these 
limitations  are  due  to  the  rigid  structure  of  the 
curriculum  and  insufficient  hours  devoted  to 
mastering the most significant (from a cybersecurity 
point of view) disciplines. Here again, we can state 
that higher-level cybersecurity competency building 
is optional and does not focus on each student. 
Highlighting  the  experience  accumulated  at  the 
Faculty  of  Physics  and  Engineering  of  Altai  State 
University, A.V. Mansurov emphasizes that elective 
classes  deal  with  a  dissected  problem  into  its 
components, and, at the first stage, for each selected 
component,  the  knowledge  and  skills  needed  to 
understand  the  essence  and  peculiarities  of  the 
processes  stated  within  the  problem  are  identified. 
The  author  considers  it  especially  important  to 
develop  reflection  so  that  the  learner  can  be  fully 
aware of what he already knows and what additional 
knowledge he needs. 
Some authors emphasize that the implementation 
of gaming technologies in cybersecurity is hindered 
by the fear of educational institutions' administration 
to obtain through such training an unethical hacker 
who can cause certain problems (Minzov et al., 2019). 
Obviously, in this case, according to the authors, 
the  emphasis  should  be  placed  on  mastering 
technologies and  methods of creating secure, fault-
tolerant IS, forming professional ethics. At the same 
time,  among  the  educational  technologies,  the 
combination of such didactic technologies as a game, 
role-playing,  and  problem-based  is  proved  to  be 
effective.  This  is  exactly  the  combination  that 
characterizes CTF format competitions. 
At the same time, it is proposed to use the time of 
independent training (following the FSES - 50% of 
the  total  curriculum),  summer  schools,  and  other 
forms  of  extracurricular  activities  to  prepare  and 
conduct competitions. Once again, it is about the lack 
of systematic and optional integration of cyber studies 
into the training of cybersecurity specialists. 
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security
158