Russian Federation
Russian Federation
The study substantiates and empirically tests the effectiveness of a constructivist approach to the design and use of educational cyber ranges as a tool for training information security specialists amid increasing cyber-threat complexity and competency shortages. The theoretical premise is that knowledge is constructed through activity and social interaction; therefore, a shift from instruction-algorithmic scenarios to open problem situations, team roles, and reflection should develop learners’ higher-order skills – heuristic thinking, metacognitive regulation, and cooperation. To test the hypothesis, a longitudinal pedagogical experiment was conducted at two technical universities with a sample of 412 students, randomly stratified into a control group (n = 206, traditional range) and an experimental group (n = 206, constructivist range); pre- and post-tests, log analysis, surveys, and focus groups were used, with statistical processing (t-test, Mann–Whitney U, Pearson/Spearman correlations) in SPSS 28.0. The results reveal no significant differences in mastering algorithmic tasks, while the experimental group substantially outperformed in heuristic tasks: accuracy 67.95% vs 48.73% and 4.15 vs 1.88 strategies generated (p < 0.001). Metacognitive indicators were higher in the experiment: reflection 7.84 vs 4.31 points, strategic planning 8.11 vs 5.02, adaptability index 0.78 vs 0.35 (all p < 0.001). The affective domain and engagement also increased: intrinsic motivation 6.35 vs 4.18, self-efficacy 6.09 vs 3.97 points (p < 0.001). Team competencies strengthened: quality of role allocation 4.33 vs 2.56; productive communication 41.7 vs 18.4 messages/hour; synergy 1.87 vs 1.12 (p < 0.001). The discussion notes that a constructivist cyber-range architecture ensures a qualitative shift from an “instruction-following operator” to a “researcher–architect” of security; practical recommendations include implementing open-ended scenarios, built-in reflection and tutor facilitation, revising assessment in favor of composite metrics, and preparing instructors for a new role. Limitations concern the contextual sample and the non-interventional nature of several measures; directions for scaling and replication are outlined.
Mysticism Scale, mystical experiences, transcendent experience, factor structure, validation, internal consistency
1. Baranov V.V. Razrabotka i vnedrenie kiberpoligona v process podgotovki specialistov po zaschite informacii [Tekst] / V.V. Baranov, A.P. Korchagina // Vestnik Voennogo innovacionnogo tehnopolisa «Era». — 2022. — T. 3. № 4. — S. 401–406. DOI: https://doi.org/10.56304/S2782375X22040027; EDN: https://elibrary.ru/OMWITG
2. Komlev Yu.Yu. Ot cifrovizacii sociuma i kiberprestupnosti k podgotovke kiberpoliceyskih [Tekst] / Yu.Yu. Komlev // Vestnik ekonomiki, prava i sociologii. 2025. — № 2. — S. 378–382. DOI: https://doi.org/10.24412/1998-5533-2025-2-378-382; EDN: https://elibrary.ru/FREOSN
3. Kuc D.V. Razrabotka programmnoy sredy uchebno-trenirovochnogo kiberpoligona [Tekst] / D.V. Kuc, S.V. Porshnev, M.P. Kuc // Ustoychivoe innovacionnoe razvitie: proektirovanie i upravlenie. — 2025. — T. 21. — № 2. S. 45–57. EDN: https://elibrary.ru/BXPYSG
4. Metel'kov A.N. Modelirovanie scenariev kiberatak v kiberpoligonah [Tekst] / A.N. Metel'kov // Vestnik Sankt-Peterburgskogo universiteta Gosudarstvennoy protivopozharnoy sluzhby MChS Rossii. — 2023. — № 2. S. 161–176.
5. Ostapenko A.G. Nauchno-proektnaya deyatel'nost' kafedry sistem informacionnoy bezopasnosti v ramkah programmy «Kiberpoligon» [Tekst] / A.G. Ostapenko, S.S. Kulikov, A.A. Ostapenko [i dr.] // Informaciya i bezopasnost'. — 2023. — T. 26. — № 3. — S. 391–402. DOI: https://doi.org/10.36622/VSTU.2023.26.3.022; EDN: https://elibrary.ru/LYPBPB
6. Abdiraman A.S., Aldasheva L.S., Darmenov B., Omurzakov T.I., Zakirova A.B. Comparative analysis of application platform for learning cybersecurity through the capturing the flag competitions // Vestnik Evraziyskogo nacional'nogo universiteta imeni L.N. Gumileva. Seriya: Tehnicheskie nauki i tehnologii. — 2023. — T. 145. — № 4. — S. 49–57. DOI: https://doi.org/10.32523/2616-7263-2023-145-4-49-57; EDN: https://elibrary.ru/PCIGSC
7. Blaži č A.J., Blažič B.J. Toward effective learning of cybersecurity: new curriculum agenda and learning methods // Journal of Cybersecurity. 2024. T. 10. № 1. URL: https://doi.org/10.1093/ cybsec/tyae018 DOI: https://doi.org/10.1093/cybsec/tyae018



