=Paper= {{Paper |id=Vol-3187/paper9 |storemode=property |title=Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation |pdfUrl=https://ceur-ws.org/Vol-3187/paper9.pdf |volume=Vol-3187 |authors=Ivan Chychkan,Svitlana Spasiteleva,Svitlana Shevchenko,Yuliia Zhdanova,Halyna Shevchenko |dblpUrl=https://dblp.org/rec/conf/cpits/ChychkanSSZS21 }} ==Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation== https://ceur-ws.org/Vol-3187/paper9.pdf
Model of Informational and Cyber Security Synthetic Learning
Environment Step-by-Step Implementation
Ivan Chychkan1, Svitlana Spasiteleva2, Svitlana Shevchenko2, Yuliia Zhdanova2, and Halyna
Shevchenko3
1
  Taras Shevchenko National University of Kyiv,64 Volodymyrska str., Kyiv, 01601, Ukraine
2
  Borys Grinchenko Kyiv University, 18/2 Bulvarno-Kudriavska str., Kyiv, 04053, Ukraine
3
  Department of Economic-Mathematical Modeling and Informational Technologies, 2 Seminars str., Ostroh,
Index, 35800, Ukraine

                Abstract
                The paper is devoted to the creation and improvement of the informational and cyber security
                learning environment for using the latest informational technologies and innovative teaching
                methods. The issues of informational and cyber security education in Ukraine are considered.
                The requirements to the modern educational environment of the higher education institution
                are determined. The stages of step-by-step improvement of the traditional closed learning
                environment with the use of the learning management system to the network learning
                environment with the possibilities of further step-by-step virtualization and transition to the
                cloud are offered. The importance and expediency of creating a synthetic online learning
                environment with extensive use of open educational resources (cloud and mobile) to increase
                the competence of students in the field of informational and cyber security has been confirmed.
                The article considers the forms of organization of the educational process, modern methods,
                tools and teaching aids for the synthetic educational environment of higher education. Taking
                into account the results of research in the psychological and pedagogical literature and their
                own experience, the amount of theoretical and practical knowledge for the formation of
                students' specialized knowledge and skills to protect informational in cyberspace was defined.
                The comparative analysis of resources of open informational and educational space is carried
                out, selection criteria are defined and the technique of their use is offered. A model of
                continuous step-by-step improvement of the network learning environment with a gradual
                transition to an open, personalized, virtual, cloud-oriented, synthetic learning environment with
                a distance form of learning is proposed. It is proved that innovative educational technologies,
                open informational and educational resources, cloud and mobile services related to data
                protection, allow to train labour market in-demand specialists with practical skills of
                informational protection. The practical implementation of the proposed method was carried
                out on the basis of Taras Shevchenko National University of Kyiv and Borys Grinchenko
                University of Kyiv.

                Keywords 1
                Informational security, cyber security, synthetic learning environment, virtualization, open
                informational and educational space.

1. Introduction
   A sign of the modern informational society is the growing influence of informational and
communication technologies (ICT) on all spheres of human activity. Digital transformation becomes
the basis of society, business, government. In the digital economy, human capital and informational
technology play a crucial role in ensuring the sustainable development of society. “There is a need to

CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine
EMAIL: chychkan@fit.knu.ua (I. Chychkan); s.spasitielieva@kubg.edu.ua (S. Spasiteleva); s.shevchenko@kubg.edu.ua (S. Shevchenko);
y.zhdanova@kubg.edu.ua (Y. Zhdanova); halyna.shevchenko@oa.edu.ua (H. Shevchenko)
ORCID: 0000-0002-0854-389X (I. Chychkan); 0000-0003-4993-6355 (S. Spasiteleva); 0000-0002-9277-4972 (S. Shevchenko); 0000-0002-
9736-8623 (Y. Zhdanova); 0000-0002-8717-4358 (H. Shevchenko)
             ©️ 2022 Copyright for this paper by its authors.
             Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
             CEUR Workshop Proceedings (CEUR-WS.org)



                                                                                89
ensure the readiness of society for such processes, mastering key combinations of knowledge, skills,
thinking, attitudes, and other personal qualities in the field of informational and communication and
digital technologies (digital competence)” - emphasizes the Concept of digital competences approved
March 3, 2021 № 167-r [1]. Digital competence is understood as a dynamic combination of knowledge,
skills, abilities, ways of thinking, views, other personal qualities in the field of informational and
communication and digital technologies, which determines a person's ability to successfully socialize,
conduct professional and / or further educational activities using such technologies [1]. In this regard,
and taking into account the needs of the market and current trends the training of highly qualified
specialists in digital technology is of particular importance. To maximize the potential of digital
technologies new professionals with modern knowledge, digital skills, capable of self-learning, solving
complex problems in a constantly changing environment are needed [2].
   Significant work has been done by the European Community to build capacity for the digital
transformation of education, in particular to change the skills and competence requirements of citizens.
The work focused on developing a framework for digital competence for citizens (DigComp), educators
(DigCompEdu), educational organizations (DigCompOrg) and consumers (DigCompConsumers).
Much attention is paid by international and European institutions to the development of digital
competence standards.
   The latest informational technologies not only produce new opportunities, but also create new and
unfamiliar risks of cyber threats, which can prevent companies and government agencies from realizing
their digital potential. One of the components of digital competence is informational security: protection
of devices, personal data and confidentiality. Digitalization should be accompanied by an increase in
the level of trust and security, "raising public awareness of the dangers of the Internet" [1].
   The formation, development and implementation of a national culture of cybersecurity are necessary
in the fight against cybercrime. At the same time, there is a need to form basic knowledge of
informational and cybersecurity for future professionals in almost all areas of training. The highlighted
problems give a convincing idea of this study relevance.

2. Development of Cyber Education in Ukraine
    Informational protection issues have long been one of the first tasks to be solved in the process of
using modern informational and communication systems. Recently, the real losses from unauthorized
access to corporate informational continue to grow. According to experts, internal leaks of corporate
informational have more negative consequences than external interventions. In 2020, companies lost 3
times more corporate data through the fault of their own employees than as a result of hacker attacks,
with 64.5% of accidental data leaks caused by the company’s employees [3]. Most threats to the
integrity and confidentiality of informational circulating in computer systems can be prevented through
the use of methods and means of protection in the appropriate training of employees. Law of Ukraine
of 05.11.2017 #2163-VIII “On the basic principles of cybersecurity of Ukraine” defines the need to
“increase digital literacy of citizens and the culture of safe behavior in cyberspace, comprehensive
knowledge, skills and abilities necessary to support cybersecurity goals, implementation of state and
public projects to raise public awareness of cyber threats and cyber defense…” [4]. The culture of safe
behavior is aimed at ensuring the cybersecurity of the individual both in the business processes of the
organization and in its daily life.
    Informational and cyber security skills are an integral part of digital competence skills, as
emphasized by domestic and foreign researchers. Diorditsa IV in its publications emphasizes the need
to deploy special and general cyber education, which should become a National Cyber Education
Strategy [5]. In the works of Buryachok VL, Bogush VM, Folding PM a model of training specialists
in the field of informational and cyber security in higher education institutions of Ukraine is presented
[6]. The authors' research [7] is devoted to the future specialists in economics and management safe
basic behavior in cyberspace formation in the educational process. Analysis of publications on cyber
education by such authors as G. Austin, A. Henry, M. Kaminska [8] G. Marshall, K. Daimi, D.
Thornton, S. Knight [9], O. Burov [10] showed that a single system, methodology and content of
training on general cyber education has not yet been formed. All scientists emphasize that modern




                                                   90
educational technologies must be used for the specialists training (both technical and humanitarian) in
informational and cyber security.
    The article considers the model of an informational and cybersecurity synthetic learning
environment step-by-step implementation and ways to implement it for the specialists in economics and
management training in the courses “Informational Security,” “Informational Security,”
“Cybersecurity” during 2017-2021 and specialists specialty 125 Cybersecurity during 2020-2021.
    In the approved standards of higher education of Ukraine for the specialists training in the knowledge
field 07 “Management and Administration” (specialists in accounting and taxation; finance, banking
and insurance; management; marketing; entrepreneurship, trade and exchange activities) and the field
knowledge field 05 “Social and behavioral sciences “specialty” Economics” defined such competencies
as the ability to use specialized informational systems and computer techno"logy in relevant fields, the
ability to use modern ICT to search, process and analyze business informational. The training of future
specialists in economics and management should reflect the future directions of development of the
working environment and ICT for the use of digital technologies in a single informational space –
cyberspace.
    Management and economic activities in accordance with the standards of higher education require
professional knowledge of management, banking, entrepreneurship, trade, etc., as well as requires
theoretical and practical knowledge of the use of interactive informational environment. Economics and
management professionals must be able not only to receive and update informational, but also to
process, store and create new informational in the global network environment. It is important to train
specialists in economics and management to perform the task of informational protection, which
involves the ability to use a set of special means of protection: legal, physical, engineering,
cryptographic [11].

3. Requirements for the Synthetic Learning Environment
    In the innovative development of higher education there is a constant improvement of the learning
environment (LE) through the introduction of modern ICT and new teaching methods. LE training of
specialists in economics and management in higher education institutions (HEI) should meet the
requirements of the informational society and digital communication environment, encourage the
search for approaches to formate future specialists in economics and knowledge management in
cyberspace, determine the scope of this knowledge and search modern tools for acquiring such
knowledge by creating a modern LE. Such an environment can be created with the use of an open
informational and educational Internet space, a networked educational environment of free educational
institutions, which will ensure cooperation of subjects of training, communication, storage of large
amounts of educational material, planning of educational events, etc.
    The problem of formation and development of computer-oriented educational environment in
educational institutions was studied by domestic and foreign scientists, in particular V.Yu. Bikov [12],
A.M. Gurzhiy, VV Lapinsky [13], SG Litvinova [14], O.Yu. Burov [15], Wilson S., Shafert S. and
others. V. Yu. Bykov notes that to design an LE is “means to theoretically investigate the essential
target and content-technological (methodological) aspects of the educational process to be carried out
in an LE, and on this basis to describe the necessary composition and structure of an LE…” [12].
Analyzing the stages of formation of LE, we can note the constant growth of requirements in accordance
with changes in the development of ICT. Mankind’s transition to the informational age is accompanied
by the emergence of new LE aspects, which are gaining rapid development and opportunities [14]. In
the work of Pinchuk O. P., Lytvynova S. G., Burov O. Y. [15] features of development of network,
virtual, mobile, personalized, cloud-oriented LE are considered. There is an increasing role of open
computer-oriented LE with the use of computer teaching aids and electronic educational resources that
are part of the ICT system of the educational institution, as well as tools, resources and services of open
informational and communication networks. In [15] the synthetic learning environment is considered,
the authors state that the synthetic learning environment is a step towards a new education. The
prevalence of the term “synthetic learning environment” in the English literature is associated with the
emergence and rapid development of e-learning tools that create new opportunities for education,
development and new forms of human socialization. “Synthetic environment” is considered in two



                                                    91
aspects - artificial environment and synthetic as is formed due to the synthesis of the real physical world
and the results of simulation and modeling [15]. Changes in the forms, methods and means of education
are accompanied by changes in the organization of LE—direct communication mediated through the
digital space, mixed, clouds, social networks, mobile technologies and more. In fact, human life is
increasingly shifting to a synthetic environment, and activities, communication, learning, leisure are
increasingly taking place in cyberspace with its advantages, disadvantages and dangers. The tendency
to transfer educational and developmental activities to a synthetic environment is determined [16]. The
purpose of the study is to theoretically substantiate and develop a method of step-by-step creation of a
personalized, mobile, cloud-oriented, synthetic learning environment for the formation of informational
security skills in cyberspace.

4. Development and Improvement of the Synthetic Learning Environment
    In accordance with the purpose of the study, the following tasks are set:
    1. Investigate the problem of using the network environment and modern ICT tools in the training
of future economists and managers. Determine the purpose and objectives of the use of synthetic LE.
    2. Determine the content of training: the amount of theoretical and practical knowledge for the
formation of comprehensive knowledge, skills and abilities in informational security and informational
protection in cyberspace in the training of specialists in economics and management.
    3. Develop criteria and indicators for the selection of open educational resources on informational
security and informational protection. Open learning resources include both server (cloud) and mobile
resources.
    4. Describe the method of using cloud-based emergencies: to determine the forms of organization,
methods and teaching aids for the formation of knowledge, skills and abilities in informational and
cyber security.
    5. Identify ways to gradually virtualize the learning process and the transition to a synthetic LE.
    6. Check the effectiveness of the use of LE to obtain knowledge of informational and cyber security
of economics and management.

4.1.    The purpose of using a Synthetic Learning Environment
    The main trends of the modern education system are personalization of learning, adaptive learning,
development of non-formal education, openness and accessibility of education, mobile learning.
Learning is increasingly being transferred to cyberspace. Free educational institutions do not keep up
with such a rapid development of ICT and modern teaching methods and tools. The EIA uses a closed
LE with the use of a learning management system implemented on the basis of an open platform, for
example, MOODLE. It is a structured multidimensional LE, which combines the possibilities of
traditional learning with modern informational technologies based on the automation of teacher-student
interaction [14]. Such an environment is limited in terms of the composition and structure of its
components and therefore has limited didactic application. Given that at the Department of
Informational Systems and Technologies of Taras Shevchenko National University of Kyiv and at the
Department of Informational and Cyber Security named after Professor VL Buryachok. M. Hrinchenko
Kyiv University traditionally uses closed LE situations using distance learning systems, there is a need
to develop a methodology for creating a network LE with the possibility of further phased virtualization
and transition to the cloud and create a synthetic learning environment. The practical implementation
of this approach began with the creation of a network LE in the training of Economiks Faculty
specialists (specialties of economics and management) in the training courses "Informational Security",
"Informational Security", "Cybersecurity". The step-by-step transition to the creation of a cloud-
oriented LE with the extensive use of open informational and educational space and innovative learning
technologies will allow to adapt to the individual needs and capabilities of each student in acquiring the
necessary professional competencies.
    The purpose of forming a modern network LE in the study of disciplines "Informational Security",
"Informational Security", "Cybersecurity" is to increase the level of complex students knowledge, skills
and abilities in informational and cyber security formation in of all fields, including 05 and 07. LE in


                                                    92
informational and cyber security is the improvement of educational and methodological complex of the
above disciplines. To obtain the necessary practical skills to protect informational in cyberspace, it is
necessary to use a variety of educational resources, forms of the educational process organization,
modern teaching methods and tools. The combination of different forms, methods and tools of teaching
will help to achieve the desired level of learning material.

4.2.    Formation of Informational and Cyber Security Skills
    A modern specialist in economics and management in accordance with the standards of higher
education must be able to work with informational, use modern ICT for the accumulation, processing,
presentation of operational data and results analysis. Equally important is the acquisition of knowledge
on the informational protection and the development of informational security strategies.
    Obtaining comprehensive knowledge, skills and abilities in informational and cyber security is
provided in the study of disciplines “Informational Security,” “Informational Security,” “Cyber
Security,” which are the variable part of the educational program to train specialists in relevant
specialties in economics and management. In accordance with the approved work programs of the above
disciplines, students must:
    • Know the basic concepts and definitions of the basics of informational and cybersecurity
    • Know the problems and main threats of informational and cybersecurity
    • Know the basic technologies of network security, security rules for working with network services
    • Organize work, public and domestic social space according to safety rules
    • Set up a personal profile and communication tools in various online communities
    • Know the principles of multilevel protection of corporate informational systems, technologies for
detecting and preventing intrusions, informational security management
    • Know the stages of designing informational security systems
    • Be able to analyze informational flows and identify threats
    • Be able to choose methods of informational protection and apply them in practice to protect
informational from unauthorized access
    • Plan and implement cybersecurity measures when creating digital content
    • Organize the security of data and working informational systems when working with personal data
and copyrighted content
    • Assess the possible risks of placing personal data on Internet resources
    • Design and use a secure informational environment for business organization
    Classical forms of education with the study of the necessary theoretical principles, mathematical
methods of informational transformation, construction of appropriate algorithms and programs and their
study of various characteristics is unacceptable due to the limited number of hours and insufficient
technical training of students. How to reduce the time of studying such topics without losing the quality
of the future specialist - this is an interesting task faced by various free economic zones. This task
requires an analysis of the possible use of existing open resources and the use of new forms and methods
of teaching.

4.3. Criteria for Selecting open Educational Resources on Informational and
Cybersecurity
   According to a survey of university students on ways to improve the educational process [17],
students determine the need to use different types of educational resources and the inclusion of open
certified courses in the relevant disciplines. The opportunity to obtain practical knowledge and
certificates from the world's leading educational institutions and companies motivates students to
conduct independent research work and acquire a specialty in the field of informational and cyber
security. Due to the transition to distance learning in quarantine, this opportunity is especially relevant.
For example, the Faculty of Informational Technology and Management of the Borys Hrinchenko
University of Kyiv offers free study of 4,262 Coursera University courses, developed by the world's




                                                    93
leading universities with a certificate (https://www.coursera.org/browse). In the table. 1 provides key
informational on safety-related learning resources.

Table 1
Comparison of open resources on informational and cyber security
  Resource     Web address     Training courses    Language Payment                  Description
   name                                                          (+/-)
 Networking https://www.n Introduction to           English,       -            Requires teacher
  Academy     etacad.com/     Cybersecurity        Ukrainian                    certification. The
   СISCO                      Cybersecurity                                     knowledge in the
                              Essentials                                        field of cybercrime,
                              CCNA                                              technologies for
                              Cybersecurity                                     network protection.
                              Operations                                        For entry-level
                              CCNA Security                                     network security
                                                                                professionals.
 Microsoft     https://docs.m    Introduction to        English         -       Microsoft Security
  Virtual      icrosoft.com/e    security in                                    Management
 Academy       n-us/ learn       Microsoft 365                                  Solutions. Providing
               /modules/         (7 Units)                                      an integrated
               security-in-      Secure your                                    approach to security,
               m365/             organization with                              data protection,
               https://docs.m    built-in,                                      applications and
               icrosoft.com/e    intelligent                                    devices in the local,
               n-us/learn        security from                                  cloud and mobile
               /modules/         Microsoft 365                                  network.
               security-with-    (6 Units)
               microsoft-365/
  Coursera     https://www.c     Introduction to        English       +/-       There are 41 courses
               oursera.org/br    Cybersecurity for                              for beginners from
               owse/informat     Business                                       the world's leading
                    ional-       Cybersecurity for                              universities and
                 technology      Business                                       companies
                  /security      Specialization
                                 IT Fundamentals
                                 for Cybersecurity
                                 Specialization
  Magnetic     https://magne     Basic course on       Ukrainian       +        To increase the level
    One        ticone.academ     informational                                  of informational
  Academy      y/course/infor    security                                       security of the
               mational-safe/    (10 topics, test                               company, protection
                                 tasks, supporting                              of infrastructure,
                                 materials,                                     intellectual property,
                                 examples and                                   confidentiality of
                                 practical video                                informational. More
                                 lessons)                                       than 150 practical
                                                                                recommendations for
                                                                                minimizing
                                                                                informational
                                                                                security risks.




                                                  94
   Pro-        https://edx.pr    Fundamentals of         Ukrainian      -       Platform of open
  metheus      ometheus.org.     informational                                  online courses. Basic
               ua/courses/KP     security                                       rules for the use of
               I/IS101/2014_                                                    personal
                  T1/about                                                      informational in
                                                                                physical and virtual
                                                                                space. Electronic
                                                                                finance security
                                                                                rules.
 Computer      https://www.c     Cybersecurity and        English       -       An open online
  Security     oursera.org/le     Its Ten Domains                               course on
    and        arn/cyber-                                                       cybersecurity and its
 Networks      security-                                                        components. Rules of
               domain                                                           joint communication
               https://www.c      Usable Security                               and interaction on
               oursera.org/le                                                   the Internet.
               arn/usable-
               security
   Using       https://www.f      Introduction to         English       -       Fundamentals of
   Future       uturelearn.co      Cyber Security                               knowledge and skills
   Learn       m/courses/int                                                    in cybersecurity.
                roduction-to-                                                   Protection rules of
               cyber-security                                                   digital life.

    To justify the choice of open educational resources, the following selection criteria are defined:
    • organizational (accessibility, ease of use, number of users, user roles);
    • functional-didactic (course program, modularity, presentation of educational material in different
formats, testing, magazine, calendar).
    According to these criteria, free courses of the International Network Academy CISCO were chosen
as the basic resource [18]. In Fig. 1 presents the available courses.




Figure 1: Cisco Networking Academy courses (https://www.netacad.com/portal/teaching)

Among the selected educational resources, the course “Cybersecurity Essentials” Networking
Academy CISCO (see Fig. 2) is used as an element of the disciplines “Informational Security,”
“Informational Security,” “Cyber Security.” Microsoft Virtual Academy and other courses are
offered to be used for independent work of students.



                                                    95
Figure 2: Course page «Cybersecurity Essentials» Cisco Networking Academy

4.4.    Use of Mobile Applications for Informational and Cyber Security
    Open learning resources include not only server (cloud) but also mobile resources that can be used
to organize mobile learning for students. Students strive for convenience and mobility in the fields of
teaching and research (writing articles, participating in conferences, developing scientific topics) [17].
Mobile technologies together with other informational and communication technologies, such as cloud
data warehouses and cloud computing, can significantly increase the efficiency of students' independent
work [19]. Mobile learning (M-Learning)—a modern direction of development of distance education
systems using mobile phones, smartphones, tablets, PDAs [20]. Educational resources and
informational can be stored in cloud storage and accessed from a variety of mobile devices, regardless
of location and time. The power and capabilities of mobile devices are constantly growing, so they can
be widely used as convenient and modern educational tools that contribute to the acquisition of new
knowledge.
    Mobile devices facilitate the understanding of educational material with the help of various subject
mobile applications. Mobile augmented reality applications allow to build a visual model of educational
material that develops the spatial imagination of students and provides an understanding of the
processes, properties of educational objects [21]. Fig. 3 shows mobile applications related to
cybersecurity. Antivirus programs, devices for protection of devices and applications are presented.




                                                   96
Figure 3: Mobile applications on cybersecurity

   Using mobile applications for independent work, the student receives in a convenient compact form
additional informational about the means and methods of informational protection, programs for the
protection of mobile devices and more. From the given list of mobile applications, which is constantly
updated, the student has access to theoretical material on the chosen research topic, can consider a
model of a certain process, get an analysis of a certain algorithm, and so on. In Fig. 4, as an example,
presents some applications in the field related to data encryption. Applications demonstrate different
encryption algorithms, simulate the operation of encryption machines.




Figure 4: Mobile applications for text encryption

   Using this application, the student learns the topic of “encryption algorithms,” gains skills in
encryption and decryption of text.
   With the help of mobile technologies, students are involved in a continuous learning and research
process that meets modern requirements and does not depend on equipment for access to resources.

4.5. Components of the Learning Environment for Informational and Cyber
Security
   The NA should provide management of the learning process, planning of learning events, creation
and storage of learning materials, organization of communications, verification and analysis of learning
outcomes and is created on the basis of learning management systems (Learning Management System,




                                                    97
LMS). Such an environment must be constantly improved through the introduction of innovative
learning technologies and the widespread use of open informational and educational space.
    Network LE is created using the following tools:
    • Learning management based on open LMS MOODLE (or cloud-based LMS Canvas)
    • Save training materials using MOODLE, Google Drive or other cloud file storage
    • Organization of cooperation using MOODLE, Wiki, Google Docs, Google Sheets, Google Slides
or MS Office 365
    • Organization of communication via MOODLE, e-mail, forums, video communication systems,
virtual audiences: Gmail, Google Chat, Google Meet, BigBlueButton, Zoom, Webex, MS Teams, etc.)
    • Knowledge testing using MOODLE, Google Forms, Kahoot and other cloud and mobile tools for
tests, quizzes, educational games
    • Planning of educational events with the help of MOODLE, Google Calendar
    • Training in informational security using open Internet resources Networking Academy CISCO,
Microsoft Virtual Academy, mobile applications, augmented reality designers
    Education of students with the use of LE is carried out in traditional forms: classes (theoretical
training), independent work, practical training, control measures (modular intermediate control, final
control). The lecture material is presented in text, graphic and multimedia formats and is stored in the
cloud storage of Google Drive files, which allows you to use a flexible system of access to educational
resources. LMS MOODLE allows you to integrate cloud services, including videos from Youtube, into
training courses to host video lectures. Links to lectures with the appropriate access rights are contained
in the e-learning course in the MOODLE system. In addition, knowledge portals and videos of open
educational resources are used, which are constantly updated. Thus, a collection of materials is created
in the field of study in accordance with the curriculum for each of the content modules. To study certain
topics, courses at Networking Academy CISCO are provided with the appropriate certificates.
    Long before the advent of COVID-19, universities have gained some experience in conducting
remote meetings, departmental meetings, lectures, practical and laboratory classes. This was usually
done by using the created virtual lecture audience in MOODLE or video communication systems. The
practice of distance learning has shown sufficient quality of communication and high efficiency of
training [22].
    With the spread of COVID-19 in Ukraine, the introduction of quarantine measures in education and
the widespread use of various distance learning platforms, there is a need to consider the functioning of
informational and methodological support of educational space in quarantine restrictions. In particular,
conclusions were made on the need to expand the existing LE through the introduction of new
informational technologies to increase the interest and success of students.
    Practical tasks use anti-virus software, informational security services, firewalls, encryption
systems, threat and vulnerability detection systems, installation of virtual machines, use of digital
signatures, etc. The results of practical tasks are presented in the form of text, tabular reports and
presentations using Google Docs, Google Sheets, Google Slides and cloud services for creating
interactive presentations (Prezi), infographics (Easel.ly).
    Testing and survey services are a convenient means of teacher-student interaction. With the help of
such services, each student can form an individual pace of learning and research, to eliminate gaps in
training in the chosen field of research. Such services can be divided into two categories, which differ
in the way questions and answers are formed, availability and convenience: cloud and mobile. The most
famous mobile survey and testing services include Kahoot, Quizlet, Plickers, Easy Test Maker. For
example, Kahoot is a free service not only for creating various forms of tests, but also for conducting
online quizzes with the help of a special client that is installed on students' smartphones (Android, iOS,
Windows Phone). This service allows the teacher to diagnose students' answers and analyze them.
    After completing the study of each content module, students undergo intermediate control using test
tasks of the MOODLE system, Google Forms and online quizzes using the mobile service Kahoot.
    Consultations in the NA were mostly carried out remotely using the MOODLE system, e-mail,
discussion, chats, which helps students to overcome the difficulties that arise when studying the
material, both in the classroom and independently.
    Independent work of students in the NA involved taking the proposed open training courses, such
as Microsoft Virtual Academy ("Introduction to security in Microsoft 365"), the use of knowledge
portals and videos of open educational.


                                                    98
5. Model of Continuous Step-by-Step Development of the Synthetic Learning
   Environment on Informational and Cyber Security
   Modern LE must be innovative, ICT-rich. Clouds, social tools, mobile technologies, virtual and
augmented reality, multimedia technologies have created many opportunities for new learning
experiences so that technology has become the highest priority in terms of learning and development.
The content of training is shifted towards self-study and project-oriented activities [15].
   In general, closed computer-oriented LE situations should gradually become open, personalized,
cloud-oriented, mobile, and virtual. As the experience of the authors shows, the improvement and
development of emergencies, the introduction of new technologies, forms and means of learning is a
continuous process. The model of informational and cybersecurity development with the use of open
informational space and innovative learning technologies is presented in Fig. 5.

                                                                Conceptual principles of creating learning environment on information and cybersecurity
                                                                Purpose: raising the level of professional knowledge and skills on information and cyber security for students.
                                                                Task: creation and step-by-step improvement of learning environment on information and cyber security.
                                                                Characteristics of the learning environment: open, personalized, adaptive, mobile (accessible), cloud-oriented, virtual.
 The latest information technologies. Cloud, mobile services.




                                                                Content of training on information and cybersecurity
                                                                Improving / editing the content component of the learning environment in accordance with the curriculum
 Open information and educational space.




                                                                Implementation of the learning environment on information and cyber security
                                                                Stages of LE implementation           Learning tools:                          Forms of teaching:            Teaching methods:
                                                                 LMS integration with cloud          Learning management tools                training sessions (video      verbal (online
                                                                   storage.                           (electronic journal, cloud calendar ),   lectures, virtual lecture     consultations, chats),
                                                                 LMS integration with open           tools for presenting educational         hall), practical training     visual (video lectures,
                                                                   information and                    materials (cloud storage,                (virtual laboratory,          Augmented reality, Virtual
                                                                   educational space. Use of          multimedia tools, cloud and mobile       augmented reality             reality, ALGAE) systems,
                                                                   cloud and mobile                   services), tools for joint activities    designers, game               research (video
                                                                   applications and services.         (cloud and mobile software), tools       programs, webinars),          conference, webinar),
                                                                 LMS integration with third-         for knowledge control, testing and       independent work (online      project method using
                                                                   party software.                    survey services, online projects),       certified courses), control   cloud services and mobile
                                                                 Transition to cloud LMS (           communication tools (video               measures (online testing).    software.
                                                                   SaaS model).                       conferencing systems, mobile
                                                                 Implementation of AR and            applications, chats, social
                                                                   VR systems, game-oriented          networks).
                                                                   learning models, ALGAE




                                                                Expected results
                                                                Improved LE structure.
                                                                Improving the level of student achievement in information and cyber security.


Figure 5: Model of continuous step-by-step development of LE on informational and cyber security

   For a step-by-step transition to an open modern LE it is necessary:
   • Integrate cloud file storage in the LMS to store course materials, such as Google Drive
   • Involve in the Internet resources of an open educational environment with opportunities to obtain
certificates and access to knowledge portals
   • Use mobile applications in the educational process to access the education system, organize
communications, professional training, etc.
   • Integrate cloud services into LMS for professional training, knowledge testing, presentation of
results, etc.
   • Expand the functionality of LMS through the use of popular cloud services for teleconferencing,
webinars, virtual audiences, online communication, educational and professional communities, etc.
   • Integrate LMS with third-party software, for example, with e-learning courses of other LMS, as
well as the exchange of training materials between them
   • Move the LMS to the cloud




                                                                                                                                99
    • Use Augmented Reality (AR) and Virtual Reality (VR) systems in the learning process to visualize
learning objects and processes. Using game-oriented learning models, ALGAE (Adaptive Learning
GAme dEsign) is an adaptive learning model based on theories and practices of game design, learning
strategies and adaptive models [15]
    The first step may be the use of cloud data warehouses to store course materials, the use of open
informational and educational environment to attract online resources from leading educational
institutions and companies around the world, the organization of distance learning by creating a virtual
lecture hall, mobile applications and visualization technologies, extensive use of cloud services for
professional training and presentation of results. This approach to the creation of emergencies is also
implemented in the preparation of students majoring in 125 “Cybersecurity” at the University of Kiev
named after Borys Hrinchenko [23].
    The next step may be the transfer of the educational process management n the clouds, the creation
of virtual laboratories for the practical training of future professionals. This will allow you not to install
and maintain your own LMS on your own internal resources. Obtaining an appropriate service from the
provider according to the SaaS cloud model (Software as a Service) involves the use of LMS, as a Web-
platform created by the provider, to manage learning. In this case, all work to ensure the installation,
debugging, maintenance and updating of software and hardware is entrusted to the provider. This allows
the use of modern LMS even for small educational institutions and individual teachers [20]. There is an
integration of Moodle with the cloud version. MoodleCloud is an affordable platform characterized by
simplicity, free maintenance, automatic updating of the Moodle version, free use for a limited number
of users (up to 50 users) [24]. The MOODLE system was deployed on the cloud server
https://moodlecloud.com/ for teaching masters the discipline “Cybersecurity” within the specialty 076
“Entrepreneurship, trade and exchange activities.” Cybersecurity course page in LMS MoodleCloud
(https://security.moodlecloud.com/coursr/viewphp?id=3).

6. Analysis of Learning Outcomes and Prospects for Further Research
    The survey of students after completing the above courses on readiness to use cloud services, mobile
applications, distance learning systems showed that 89% of students rated 4-5 on a 5-point scale the
need and convenience of using these technologies in education. Students are motivated to take certified
courses in informational and cyber security. The study [17] presents an analysis of the course
“Cybersecurity Essentials” of the CISCO Academy, which demonstrates the high performance of
students of the group "Innovation Management" (masters).
    Students work according to the schedule approved by the teacher, send assignments on time. The
teacher has data on the activity of tasks by dates and other indicators.
    93.1% of students enrolled in the educational programs "Innovation Management" (masters) and
“Economic Cybernetics” (bachelors) have successfully completed courses and received certificates
from the Academy of CISCO. The work of 6.9% of students is assessed as satisfactory, and the
certificate is not issued. There were no students who received an unsatisfactory grade.
    The business world is becoming more global, mobile and digital, so it is necessary to increase the
level of training of future professionals, in particular in economics and management in accordance with
the needs of digital technologies. In this regard, it is necessary to develop a national strategy for cyber
education, ie to deploy a special and general system of cyber education, in particular to pay more
attention to the formation of a "culture of cybersecurity" in future professionals in the digital economy.
    In accordance with the requirements outlined in the article to the learning environment for
informational and cyber security, a method of gradual introduction of new innovative learning
technologies using open informational and educational space, mobile learning technologies, cloud
applications and services. As a result of the research, the stages of gradual transition from a closed
network learning environment to an open, personalized, cloud-oriented, synthetic one are determined.
Continuous improvement of the learning environment with the possibility of step-by-step virtualization
allows gradually moving to distance learning using virtual classrooms and laboratories, augmented
reality technology to build a visual model of learning material that shifts the content of learning towards
self-learning and project-oriented activities.




                                                    100
    The results of the study showed that the use of the proposed learning environment helps students
gain the necessary knowledge, skills and abilities in informational and cyber security, increases the
interest and success of students. The use of open learning resources with the ability to obtain certificates,
mobile and cloud applications allows students to choose convenient forms and means of learning to
gain practical skills in informational security in cyberspace.
    We see areas for further research in the introduction of new learning technologies, the development
of a learning environment for informational and cyber security for higher education students in the
fields of knowledge covering the humanities and natural sciences.

7. References
[1] Cabinet of Ministers of Ukraine. (2021, Mar. 03) Order No. 167-r. On approval of the Concept of
     development of digital competencies and approval of the action plan for its implementation. URL:
     https://zakon.rada.gov.ua/laws/show/167-2021-%D1%80#Text
[2] Digital Agenda of Ukraine – 2020). Conceptual principles (version 1.0). Priority areas, initiatives,
     projects of "digitalization" of Ukraine until 2020. HITECH office. – Грудень 2016. – 90 с. URL:
     https://ucci.org.ua/uploads/files/58e78ee3c3922.pdf.
[3] Cyber Security Breaches Survey 2020. URL: https://www.gov.uk/government/statistics/cyber-
     security-breaches-survey-2020/cyber-security-breaches-survey-2020.
[4] Verkhovna Rada of Ukraine. (2017, Oct. 05) Law № 2163-VIII, On the Basic Principles of Cyber
     Security of Ukraine.URL: https://zakon.rada.gov.ua/laws/show/2163-19.
[5] I.V. Diorditsa, The state of training of specialists in the field of cybersecurity. Visegrad Jornal of
     Human Rights 1 (2016) 53– 59.
[6] V. Buryachok, V. Bogush, Yu. Borsukovskyj, P. Skladannyj, V. Borsukovska, Model of training
     specialists in the field of informational and cyber security in higher education institutions of
     Ukraine, Informational Technologies and Learning Tools, 5 (2018), pp. 277-291. doi:
     10.33407/itlt.v67i5.
[7] I. V. Chychkan, S. O. Spasiteleva, Yu. D. Zhdanovа, The educational environment for forming
     secure base behavior in cyberspace of future professionals in economics and management
     Informational Technologies and Learning Tools 4 (2021) 354-375. doi: 10.33407/itlt.v84i4.3646
[8] G. Austin, Eds. Cyber Security Education. Principles and Policies. New York, NY, UK and New
     York: Routledge, 2020.
[9] K. Daimi, G. Francia, Eds. Innovations in Cybersecurity Education. London, UK: Springer, 2020,
     doi: https://doi.org/10.1007/978-3-030-50244-7.
[10] O. Burov, S. Lytvynova, E. Lavrov, Yu. Krylova-Grek, S. Shevchenko, O. Orliyk, S. Petrenko, O.
     Tkachenko, Cybersecurity in Educational Networks, in: Proceedings of the 3rd International
     Conference on Intelligent Human Systems Integration (IHSI 2020): Integrating People and
     Intelligent Systems, February 19-21, 2020, Modena, Italy, 1131, pp. 359-364. doi:10.1007/978-3-
     030-39512-4_56
[11] Yu. D. Zhdanovа, S. O. Spasiteleva, S. M. Shevchenko, Formation of informational protection
     competence to students of it-specialties with using .NET FRAMEWORK cryptographic services,
     Physical and mathematical education. 1 (2019) 48-54.
[12] V. Yu. Bykov, Open learning environment and modern network tools of open education systems,
     Scientific journal of National Pedagogical Dragomanov University. Series 2: Computer-based
     learning systems 9 (2010) 9-15. URL: http://nbuv.gov.ua/UJRN/Nchnpu_2_2010_9_4.
[13] A.M Gurzhіy, V.V. Lapіnsky, Electronic educational resources as the basis of the modern
     educational environment of secondary schools, Journal of Informational Technologies in
     Education, 15 (2013) 30-37. doi: 10.14308/ite000388.
[14] S. H. Lytvynova, Development of educational environment of a comprehensive educational
     institution as a scientific problem Scientific Bulletin of Melitopol State Pedagogical University.
     Ser.: Pedagogy. 1 (2014) с. 39-47. URL: http://nbuv.gov.ua/ UJRN/Nvmdpu_ 2014_1_7.
[15] O.P. Pinchuk, S. H. Lytvynova, O. Yu. Burov, Synthetic educational environment – a footpace to
     new education, Informational Technologies and Learning Tools 4 (2017), с.28-45. doi:
     10.33407/itlt.v60i4.



                                                    101
[16] Synthetic Environments for HSI Application, Assessment, and Improvement, STO TECHNICAL
     REPORT TR-HFM-216. AC/323 (HFM-216) TP/614, 2015.
[17] The results of a survey of students of the Faculty of Economics of KNU, 2019/2020 academic year. URL:
     http://econom.univ.kiev.ua/wp-content/uploads/2019/12/Результати-опитування-студентів-
     2019.pdf.
[18] CISCO Networking Academy: Security courses. URL: https://www.netacad.com/portal/teaching.
[19] O.M. Kryvonos, O.V. Korotun, Stages of Designing a Cloud-Oriented Environment in Learning
     Databases of Future Teachers of Informatics, Informational Technologies and Learning Tools 1
     (2018), 130-145. doi:10.33407/itlt.v63i1.
[20] UNESCO            Policy      Guidelines      for     Mobile      Learning      (2013)     URL:
     http://iite.unesco.org/pics/publications/ru/files/3214738.pdf.
[21] Augmented reality in education. VR-Journal | Virtual and augmented reality portal (2017). URL:
     https://vr-j.ru/stati-i-obzory/dopolnennaya-realnost-v-obrazovanii.
[22] BigBlueButton – Open Source Web Conferencing (2020) Engage Your Online Students:
     BigBlueButton is a web conferencing system designed for online learning. URL:
     https://bigbluebutton.org.
[23] Yu. D. Zhdanovа, S.О. Spasiteleva, S.M. Shevchenko, The Application of the
     Security.Cryptography Class Library for the Practical Training of Cyber Security Specialists,
     Cybersecurity: education, science, technology, 4 (2019), с.44-53. doi: 10.28925/2663-4023.2019.4
[24] L.V. Nozdrina, Innovative CLOUD COMPUTING: Challenges for Education, Journal of
     Informational Technologies in Education, 1 (2019), 19-50. doi: 10.14308 / ite000691.




                                                   102