125 鈥淐yber Security鈥
What is cybersecurity?
Cybersecurity is the use of technologies and methods of computer systems, networks, programs and data protection in cyberspace against unauthorized access, modification, destruction, and other cyber threats.
Why is it so important?
Each year the number of cyberattacks is increasing. They are getting more dangerous and cause some serious consequences: stolen data, financial loss, election falsification, and national security threats.
What is a specialist in cyber security?
The specialists are engaged in computer systems protection against hacker鈥檚 attacks, they administrate computer networks, develop reliable software, carry out audit of information security.
What shall I study?
Main academic disciplines for specific purposes:
- Computer Network Security
- Operating Systems Security
- Software Security
- Information Computer System Security Audit Methodologies
- Business Continuity and Information Security Management
- Integrated Information Security Systems: Design, Implementation, Support
- Information Secutity Management
- Regulatory Support for Information Security
- Applied Cryptology
- Technical Systems for Information Security
- Computer Steganography
Other 袉孝 disciplines:
- Fundamentals of Programming (C++)
- Software Development (Python, 小#/.Net)
- Network Programming (Python, NGINX, Apache)
- Programming for Mobile Devices (Kotlin, Java)
- WEB-technologies (Java script, HTML, CSS)
- Data Base (MySQL, PostgreSQL)
- IT Project Management
- Interpersonal Skills, Team Building and Teamwork
- Quality and Software Testing (QA)
- Fundamentals of Computer Technologies
- Operating Systems
- Computer Networks
- Data Mining
- Artificial Intelligence (Methods and Systems)
Main problems which can be solved by a future graduate:
- Develop software and analyze its safety
- Conduct software testing
- Design, administrate and provide the computer network security
- Design and assure web sites protection
- Carry out penetration testing
- Provide business processes continuity
- Provide cryptographic protection of information
- Develop and implement the information security strategy
- Conduct the audit of information systems security
- Implement complex systems of information protection
- Investigate cyber crimes
- Eliminate or minimize the consequences of hacker鈥檚 attacks
Where can I work?
Main possible positions after graduation:
- Cyber police officer
- Cyber security analyst
- Ethical hacker
- Information security manager
- Engineer of information technical security service
- Information security tools developer
- Information systems security auditor
And also:
- Software developer
- QA engineer
- Project manager (PM)
- Computer network administrator (sysadmin)
- Data Analysist
Fields where a graduate can be employed in:
- 袉孝-肠辞尘辫补苍颈别蝉
- State institutions
- Banks
- Industrial enterprises
- Cyber police
- Military service
- SOC (Security Operation Center)
- Information security departments at enterprises
袩械褉械谢褨泻 褋械褉褌懈褎褨泻邪褌褨胁 袟袧袨 褌邪 胁褋褌褍锌薪懈褏 胁懈锌褉芯斜褍胁邪薪褜 写谢褟 胁褋褌褍锌褍 薪邪 芯褋胁褨褌薪褞 锌褉芯谐褉邪屑褍 "泻芯屑锌'褞褌械褉薪邪 褨薪卸械薪械褉褨褟"
蟹邪 写械褉卸邪胁薪懈屑 蟹邪屑芯胁谢械薪薪褟屑:
校泻褉邪褩薪褋褜泻邪 屑芯胁邪
袣1=0,3
袦邪褌械屑邪褌懈泻邪
袣2=0,3
肖褨蟹懈泻邪 邪斜芯 袉薪芯蟹械屑薪邪 屑芯胁邪 邪斜芯 袉褋褌芯褉褨褟 校泻褉邪褩薪懈 邪斜芯 啸褨屑褨褟 邪斜芯 袘褨芯谢芯谐褨褟 邪斜芯 袚械芯谐褉邪褎褨褟
袣3=0,3
小械褉械写薪褨泄 斜邪谢 邪褌械褋褌邪褌褍
袣4=0,1

Member of European University Association