Abstract and keywords
Abstract (English):
The growing digitalization of all areas of human activity makes it necessary to train various categories of users, from ordinary information consumers to cybersecurity specialists, to solve the problems of information security. Just as cybersecurity analysts use various software tools in their work, various software products are used in the training of specialists. In the course of the study, it is necessary to select the most suitable tools for the educational process, formulate requirements for the implementation of a dialogue mode and a user interface, and propose a software implementation option.

Keywords:
cyberthreats, educational process, competence, cyber threat simulator, gamification, modeling
Text
Text (PDF): Read Download
References

1. Cybersecurity Tools. URL: https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-use (data obrashcheniya: 06.10.2025).

2. MONT otkryla kiberpoligon dlya testirovaniya reshenij po informacionnoj bezopasnosti. URL: https://www.mont.ru/ru-ru/news/6312 (data obrashcheniya: 05.10.2025).

3. Fishing – tebe pishut moshenniki. URL: https://www.sberbank.ru/promo/scs-school/courseid-2.html (data obrashcheniya: 15.10.2025).

4. Obzor mirovogo i rossijskogo rynkov sredstv simulyacii kiberatak (Breach and Attack Simulation, BAS). URL: https://www.anti-malware.ru/analytics/Market_Analysis/Breach-and-Attack-Simulation-Market-Overview (data obrashcheniya: 01.10.2025).

5. Vovlekayushchee obuchenie dlya superkomand. URL: https://quizlab.pro/ (data obrashcheniya: 05.10.2025).

6. Interaktivnyj simulyator ataki programm-vymogatelej TADVISER. URL: https://www.tadviser.ru/index.php (data obrashcheniya: 03.10.2025).

7. Kiberpoligon Ampire. URL: https://softline.ru/solutions/security/kiberpoligon-ampire (data obrashcheniya: 23.08.2025).

8. Standoff Cyberbones: simulyator dlya real'noj praktiki v rassledovanii kiberatak. URL: https://www.securitylab.ru/analytics/557408.php (data obrashcheniya: 29.08.2025).

9. Kaspersky Interactive Protection Simulation (KIPS). URL: https://www.robotx.ru/programmnoe-obespechenie/informatsionnaya--bezopasnost/platforma-obuchenie-kiberbezopasnosti/Kaspersky-Interactive-Protection-Simulation-KIPS/ (data obrashcheniya: 17.10.2025).

10. Kak sdelat' iz vashih sotrudnikov pervuyu liniyu kiberzashchity vsego za 2 nedeli? URL: https://avareange.ru/ (data obrashcheniya: 11.10.2025).

11. Validate Your Cybersecurity Posture and Resilience. URL: https://cyberranges.com/ (data obrashcheniya: 01.10.2025).

12. Interaktivnyj simulyator ot «Laboratorii Kasperskogo» – novyj podhod k obucheniyu zashchite ot kiberugroz. URL: https://gk-ur.ru/info/news/interaktivnyy-simulyator-ot-laboratorii-kasperskogo-novyy-podkhod-k-obucheniyu-zashchite-ot-kiberugr/ (data obrashcheniya: 05.10.2025).

13. Microsoft predstavila simulyator kiberatak s mashinnym obucheniem. URL: https://habr.com/ru/news/551558/ (data obrashcheniya: 09.10.2025).

14. Top 10 Best Cyber Attack Simulation Tools – 2025. URL: https://cybersecuritynews.com/cyber-attack-simulation-tools/ (data obrashcheniya: 02.10.2025).

15. Infection Monkey: Test and validate your defenses with Infection Monkey, our free open-source malware vaccine. URL: https://www.akamai.com/infectionmonkey (data obrashcheniya: 11.10.2025).

16. Attack Surfaces Expanding Faster Than Teams Can Manage. URL: https://www.picussecurity.com/ (data obrashcheniya: 01.10.2025).

17. Cymulate – Exposure Management Platform Built for Real Risk. URL: https://cymulate.com/ (data obrashcheniya: 01.08.2025).

18. MONT otkryla kiberpoligon. URL: https://www.mont.ru/ru-ru/news/6312 (data obrashcheniya: 13.10.2025).

19. 10 instrumentov modelirovaniya kiberatak dlya povysheniya bezopasnosti. URL: https://dzen.ru/a/ZG89c5dzB3yyeIzP (data obrashcheniya: 19.10.2025).

20. Get Involved https. URL: //caldera.mitre.org/ (data obrashcheniya: 18.10.2025).

21. High-Risk Exposures Faster. URL: https://xmcyber.com/ (data obrashcheniya: 01.10.2025).

22. PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks. URL: https://deepai.org/publication/prism-a-hierarchical-intrusion-detection-architecture-for-large-scale-cyber-networks (data obrashcheniya: 11.09.2025).

23. What is Threat Simulation? URL: https://xmcyber.com/glossary/what-is-threat-simulation/ (data obshcheniya: 04.10.2025).

24. Real'naya ataka zashchishchaet. Simulyaciya kiberatak s pomoshch'yu BAS-reshenij. URL: https://www.cti.ru/media/publications/realnaya-ataka-zashchishchaet-simulyatsiya-kiberatak-s-pomoshchyu-bas-resheniy/ (data obrashcheniya: 01.10.2025).

25. Gamification And Simulations: Powering Up Training And Productivity. URL: https://elearningindustry.com/gamification-and-simulations-powering-up-training-and-productivity (data obrashcheniya 18.10.2025).

26. Kirstie Greany Why gamification in elearning is important. URL: https://www.elucidat.com/blog/why-gamification-in-elearning-is-important/ (data obrashcheniya: 19.10.2025).

27. Akap'ev V.L., Savotchenko S.E. Gejmifikaciya v elektronnom obrazovanii // Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Problemy vysshego obrazovaniya. 2025. № 3. S. 19–23.

28. The Top 5 Benefits of Gamification in Learning. URL: https://www.learnlight.com/en/articles/5-benefits-of-gamification-in-learning/ (data obrashcheniya: 01.10.2025).

Login or Create
* Forgot password?