Conclusion of the training course for first and second level cybersecurity students on information security management