Annotation:
In the context of the pandemic, the role of computer security specialists in solving the problems
of uninterrupted operation of transport enterprises has increased many times. The article is devoted
to summing up and analyzing the experience accumulated in the RUT (MIIT) for 20 years of training
specialists in the specialty “Computer Security”, determining the prospects for the development of the
educational program. The article presents a methodology for using freely distributed software created
by the authors of the article in the learning process in cases where it is impossible or unsafe on real
objects. The main advantage of this technique is that it takes into account the experience gained by
specialists in solving real cases, allows you to reproduce real system vulnerabilities without harming
real systems for training purposes, makes it possible to diagnose these vulnerabilities, exploit them,
choose and compare diff erent ways to remove them from the system. The article contains an analysis
of publications devoted to the experience of training personnel in the specialty “Computer Security”
in diff erent countries using various tools. The article provides an overview of the educational program
and formulates the principles that form the basis of training at our university, demonstrates examples
of the use of digital doubles in the learning process, focuses on the formation of interdisciplinary connections,
skills of applying theoretical knowledge to solve practical problems and analyze the results
obtained. The review of the subjects of the discipline “Methods of risk management analysis”, statistical
analysis of the results of the implementation of the methodology developed by the authors in practice,
and their graphical interpretation is carried out. Examples of the application of risk theory to solving
computer security problems are given. The article contains examples of students ‘ participation in
research activities, the creation of methodological support for the relevant educational program,
and various events outside the university.
Key words:
Computer security, training, digital double, vulnerability, risk