Why joining us:
- high level of learning programming technologies
- modern applied software applications development
- educational and computing practice in IT companies
- implementation in the educational process of teamwork on mini-projects under the guidance of mentors from IT companies
- internship and continuing education abroad
- possibility of obtaining international cybersecurity certificates
- joining the community of IT professionals
Purpose of the program
training highly qualified professionals who are able to develop and use modern
methods and means of information protection.
Main training areas and courses:
- programming technologies
- cryptographic protection
- information security architecture and models
- global cybersecurity practices of companies
- safety during operation and maintenance of information systems
- Information Security Risk Management
- security of software application development and support
- cloud application security
Obtaining internationally recognized cybersecurity certificates
University opportunities:
- accommodation in university dormitories
- student information space: modern classrooms, laboratories with licensed software, research centers and societies
- support and participation in international programming competitions (competitions, contests, hackathons, conferences, etc.)
- sports clubs, societies, services of sports and recreation complex and swimming pool
- artistic groups, participation in festivals, competitions, etc.
Areas of scientific research:
- New types of attacks, analysis and protection
- Types of vulnerabilities and how to deal with them
- How to properly build a defense
- New tactics and strategy selection in SOC creating
- Engineering and Management of SOC Technologies
- Security Information and Event Management (SIEM) systems
- Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS)
- Firewalls (FW)
- Endpoint Detection and Response (EDR) systems
- User and Entity Behavior Analytics (UEBA) tools
- Malware analysis systems and sandbox environments
- Artificial intelligence and machine learning for anomaly detection
- Anti-phishing and anti-malware
- Cryptology and encryption
- Information security management
- Security of computer networks and the Internet
- Privacy and protection of personal data
- Organizational and legal issues of information security
- Teamwork and presentation skills
- The latest approaches to the training of cyber security specialists
- Quantum cryptography
- Biometric authentication and multi-factor protection
- IoT device security
- Zero Trust Architecture
Your career perspective:
software development, information analytics, information systems security, financial and economic security, project and software management.