JOINT TRAINING OF THE CYBER SECURITY DEFENSE FORCES PERSONNEL IN THE CONDITIONS OF TOTAL STATE DEFENSE
Abstract
Nowadays, the process of Defense Forces training allows to agree the strategic requirements for training objectives, its tasks, and selected priorities for generating trained and ready to perform tasks of personnel, military units (units), and military authorities.
The relevance of developing a single modern content of competencies on cybersecurity for specialists of higher military educational institutions and military educational units of higher education institutions of the State Defense Forces during the joint multilevel training of personnel is substantiated in the article.
Theoretical aspects of the formation and acquisition of individual capabilities by cybersecurity specialists, in accordance with the developed training standards, to achieve compatibility in the training of units of the Defense Forces and NATO member states were analyzed.
Emphasis is placed on the issues of standardization of training in the specialіty 125 “Cybersecurity” and the professional competencies of specialists in the field of cybersecurity to acquire independent programs that require a rapid and joint response to the threat of military security agencies of Ukraine, as well as threats in other areas of state activity. formation and implementation of state policy in the field of civil protection
The result of the study is the development of a single modern list of requirements for specialists of higher education institutions of the Defense Forces in the area of cybersecurity, which is consistent with the Military Security Strategy of Ukraine, takes into account the requirements of the Basic Joint Operational Concept “Defense Forces - 2030” and ensures readiness states to comprehensive (total) defense by conducting joint (interservice, interstate departmental, multinational) operations.
Downloads
References
Vorobiyenko, P.P. Teoretyko-metodologichne obgruntuvannya i praktychne vprovadzhennya systemy pidgotovky faxivciv dlya sektoru bezpeky` i oborony Ukrayiny z kiberbezpeky. URL: https://itgip.org/wp-content/uploads/2019/06/%D0%A0%D0%B5%D1%84%D0%B5%D1%80%D0%B0%D1%82.pdf [in Ukrainian].
Yevsyukova, O.V. Osoblyvosti pidgotovky faxivciv u sferi kiberbezpeky: suchasni vyklyky ta perspektyvy: http://www.dy.nayka.com.ua/pdf/2_2021/4.pdf [in Ukrainian].
Ukaz Prezydenta Ukrayiny “Pro rishennya Rady nacionalnoyi bezpeky i oborony Ukrayiny vid 27 sichnya 2016 roku “Pro Strategiyu kiberbezpeky Ukrayiny””. URL: https://zakon.rada.gov.ua/laws/show/96/2016#Text;
Doktryna pidgotovky Syl oborony derzhavy, zatverdzhena nakazom Generalnogo shtabu Zbrojnyx Syl Ukrayiny vid 21.01.2020 No. 18, VKP 7-00(01).01 [in Ukrainian].
Fakultet informacijno-kompyuternyx texnologij, specialnist: 125 “kiberbezpeka”. Informaciya pro specialnist. URL:https://vstup.ztu.edu.ua/bakalavr/125-kiberbezpeka/ [in Ukrainian].
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).