What is this study program aim?
The program aims at preparing highly qualified information and information technology security specialists, by forming the systematic view on root causes of information security issues, their prevention, solving, and compensation methods, providing students with the newest knowledge and abilities from the professional and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills.
What are the outcomes of this study program?
Knowledge of modern cyber threats, vulnerabilities, risks, and attack vectors, covering, but not limited to technological, physical security and social areas, ability to identify and neutralize them, minimize the consequences.
Understanding of information and information technology security principles and concepts, covering, but not limited to technological, organizational, social and legal aspects, knowledge of modern information systems security mechanisms and ability to apply them, perception of secure information system design and development methods and ability to integrate information security mechanisms into information security systems and processes.
Ability to Perform Research
Proficiency in defining perspective research areas, ability to perform literature analysis and cite the literature sources, to plan and to carry out the experiment in the defined problem area, to apply different analytical, modeling and experimental methods, to evaluate qualitative and quantitative information, to apply the experimental results for solving practical problems.
Ability to perform analysis, logical reasoning, to formulate constructive, reasoned conclusions and recommendations, to understand and criticize ideas and results of other researchers, to prepare scientific research publications, to participate in a scientific discussion.
Ability to integrate security mechanisms into software, information systems, and processes, to apply cryptographic, secure programming and code security analysis, ethical hacking, cyberforensics, secure network, and virtual infrastructure design methods, understanding of specific security aspects of different operating systems, DBMS and other information systems.
Ability to evaluate the maturity of information systems and organizations from the security perspective, to apply risk management methods and requirements of information security standards and other regulating documents while organizing the business processes, ability to ensure organization's compliance and certification processes according to the security standards requirements, to maintain information security management processes, integrate them with other business processes, projects, to ensure business process continuity.
Ability to work individually and in a team, to work with colleagues having different educational and professional backgrounds, to communicate orally and in writing, to submit proposals, and to effectively communicate with professionals from other areas.
To express and defend the opinion, to respect other opinions.
Ability to think critically, independently, and constructively, to implement innovative solutions and evaluate their consequences.
Ability for self-improvement, forming and increasing the knowledge base, to plan the study process, labor, and time, to seek the result.
Exchange period abroad?
According to various international cooperation and exchange programs, there is an opportunity to study in Germany, Austria, Finland, Greece, Portugal, South Korea, Taiwan, Poland, Ukraine, Belarus, and many other countries around the world for one or two semesters.
What about career opportunities after Master's degree studies?
Graduates can join Ph.D. studies or will have the following carrier opportunities:
Chief information security officer
Information security auditor
IT security project manager
Security-oriented information system architecture
Security-specialized system administrator