Cybersecurity

Faculty of information Technology

Name
Cybersecurity
Program code
20270
Qualification awarded
Bachelor Cybersecurity
Length of programme
4 years
Number of credits
240
level of qualification according to the National Qualification Framework and the European Qualifications Framework
6
Qualification level
First (Bachelor)
Discipline
Information technologies
Speciality
KnowledgeField EN
Specific admission requirements
Complete general secondary education (NQF Level 3) or higher
Specific arrangements for recognition of prior learning
Admission was based on the results of External Independent Assessment of Ukrainian language and literature, Mathematics, Physics / Foreign Language
Qualification requirements and regulations, including graduation requirements
Programme learning outcomes
To be able to apply knowledge of state and foreign languages in order to ensure the effectiveness of professional communication; - to be able to analyze, argue, make decisions in solving specialized problems and practical problems in professional activities, characterized by complexity and incomplete definition of conditions, be responsible for the decisions made; - to be able to act on the basis of the legislative and regulatory framework of Ukraine and the requirements of relevant standards, including international ones in the field of information and / or cybersecurity; - to be able to perform analysis and decomposition of ITS; - to be able to analyze of connections between information processes on remote computer systems; - to be able to develop models of threats and violators; - to be able to analyze of ITS projects based on the standardized technologies and data transmission protocols; - to be able to provide processes of protection and functioning of information-telecommunication (automated) systems on the basis of practices, skills and knowledge concerning structural (structural-logical) schemes, network topology, architectures and models of protection of electronic information resources; - to ensure the operation of special software to protect information from the destructive software effects of destructive codes in ITS; - to solve problems of management of procedures of identification, authentication, authorization of processes and users in ITS according to the established policy of information and / or cybersecurity; - to be able to provide processes of protection of information, information and telecommunication (automated); - to be able to analyze and assess the effectiveness and level of protection of resources of different classes in information and information and telecommunications (automated) systems; - to solve problems of management of processes of restoration of regular functioning of ITS; - to solve problems of providing and support of complex systems of information protection, and also counteraction to unauthorized access to information resources and processes in information and information and telecommunication (automated) systems according to the established policy of information and / or cybersecurity; - to be able to detect dangerous signals of technical means; - to measure the parameters of dangerous signals for technical channels of information leakage and determine the effectiveness of protection against information leakage in accordance with the requirements of regulatory documents of the technical information protection system; - to be able to interpret the results of special measurements using technical means, control the characteristics of ITS in accordance with the requirements of regulatory documents of the technical protection of information; - to conduct attestation (based on registration and inspection) of regime territories, premises, etc. in the conditions of observance of the regime of secrecy with fixing of results in the corresponding documents; - to ensure the continuity of the process of keeping logs of events and incidents on the basis of automated procedures;
Form of study
Full-time form
Examination regulations and grading scale
The final evaluation of learning outcomes at the University is carried out on a single 100-point scale. The assessment of the applicant corresponds to the ratio established of the level of professional and general competencies to the planned learning outcomes (as a percentage). The minimum positive level of assessment is 60 points. According to the results of exams, according to the results of course and diploma works (projects); based on the results of work in practice, the student is also graded on a 4-point scale: “Excellent”, “Good”, “Satisfactory”, “Unsatisfactory”. If the final exam is not conducted in the disciplines, the results of the applicant’s work are evaluated on a 2-point scale: “Passed” or “Fail”.
Оbligatory or optional mobility windows (if applicable)
Work placement
Work-based learning
Director of the course

Faculty of information Technology
Occupational profiles of graduates
Jobs in companies, private and public sector enterprises in the field of information and cyber security. Information security specialist.
Access to further studies
Provides access to second (master) level of higher educationto gaining of additional qualification within adult education system

Subjects

As part of the curriculum, students study the following disciplines

Complex information protection systems
Code: ОК 16,
Information technology in cyberspace
Code: ОК 5,
Fundamentals of algorithmization and programming
Code: ОК 27,
Electronics and microcircuit engineering
Code: ОК 11,
Code: ОК 1,
Code: ОК 2,
Code: ОК 3,
Code: ОК 4,
Code: ОК 6,
National and information security of the state
Code: ОК 7,
Operating systems and their protection
Code: ОК 8,
Programming technologies of protected systems
Code: ОК 9,
Signals and processes in technical information protection systems
Code: ОК 10 ,
Architecture of computer systems
Code: ОК 12,
Code: ОК 13,
Code: ОК 14,
Code: ОК 15,
Code: ОК 17,
Code: ОК 18,
Code: ОК 19,
Code: ОК 20,
Code: ОК 21,
Code: ОК 22,
Code: ОК 23,
Mathematical foundations in information and cyber security
Code: ОК 24,
Code: ОК 25,
Code: ОК 26,
Code: ОК 28,
Code: ОК 29,
Code: ОК 30,
Code: ОК 31,
Code: ОК 32,
Code: ОК 33,
Code: ВБ 1.1,
Code: ВБ 1.2,
Malicious code detection technologies
Code: ВБ 1.3,
Code: ВБ 1.4,
Code: ВБ 1.5.,
Code: ВБ 1.6.,
Applied programming technologies in information security
Code: ВБ 1.7.,
Code: ВБ 1.8,
Code: ВБ 2.1,
Code: ВБ 2.2,
Code: ВБ 2.3,
Code: ВБ 2.4,
Security of distributed information systems
Code: ВБ 1.8,
Code: ВБ 2.6,
Code: ВБ 2.7,
Code: ВБ 2.8,
Protection of confidential data
Code: ВБ 4.2,
Protecting electronic document management
Code: ВК 2.02.04,
Information protection in distributed systems
Code: ВБ 1.3,
Information and cyber security of a modern enterprise
Code: ВК 2.03.04,