Cyber security technologies

Course: CyberSecurity

Structural unit: Faculty of information Technology

Title
Cyber security technologies
Code
ОК 4
Module type
Обов’язкова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2021/2022
Semester/trimester when the component is delivered
1 Semester
Number of ECTS credits allocated
6
Learning outcomes
Analyze, monitor and ensure the effective functioning of the system for managing access to information resources in accordance with the established strategy and policy of cyber security of the organization. Research, develop and implement methods and measures to counter cyber incidents, implement management, control and investigation procedures, as well as provide recommendations for the prevention and analysis of cyber incidents in general. Make informed decisions on organizational and technical issues of cyber security in complex and unpredictable conditions, including using modern methods and means of optimization, forecasting and decision-making.
Form of study
Full-time form
Prerequisites and co-requisites
Know: • basic concepts and categories, principles, approaches and methods of ensuring cyber security; • basic principles of functioning and development of cyber security systems. Have skills: • application of modern information technologies; • understanding and practical application of approaches to ensuring cyber security.
Course content
Within the framework of the discipline "Technologies for ensuring cyber security", the issues of training students by profession, formation of theoretical knowledge and practical skills in countering third-party cybernetic influence under certain specific conditions are considered.
Recommended or required reading and other learning resources/tools
1. Buryachok, V. L. Fundamentals of the formation of the state cyber security system: monograph/ V. L. Buryachok.— K.: NAU, 2013— 432 p. 2. Hnatiuk, S. O. Cyberterrorism: history of development, modern trends and countermeasures / S. O. Hnatiuk// Information security.— 2013.— Vol. 19, No. 2.— P. 118–129. 3. The National Security and Defense Council of Ukraine: Ukraine-NATO expert consultations on cyber security issues [Electronic resource].— Access mode: http://www.rainbow.gov.ua/news/ 1076.html 4. Korchenko, O. G. State cyber security: characteristic features and problematic aspects / O. G. Korchenko, V. L. Buryachok, S. O. Hnatyuk // Information security.— 2013— Vol. 19, No. 1 .— P. 40–45. 5. Melnyk, S.V. To the problem of formation of the conceptual and terminological apparatus of cyber security / S.V. Melnyk, O.O. Tikhomirov, O.S. Lenkov // Collection. of science works of the Military Institute of KNU named after Taras Shevchenko.— K.: VIKNU, 2011.— Issue 30.— P. 159–165.
Planned learning activities and teaching methods
Lectures, laboratory activities, practical activities, individual work.
Assessment methods and criteria
Control is carried out according to the modular rating system. The course consists of 2 content modules. Content module 1 (ЗМ1) includes topics 1 - 2, topics 3 - 5 are included in content module 2 (ЗМ2). Admission to the exam is based on the student's successful completion of laboratory assignments and writing modular control papers for the 1st and 2nd content modules (based on the materials of lecture, laboratory and practical classes). The results of students' educational activities are evaluated on a 100-point scale. The recommended minimum for admission to the exam is 36 points. The exam is valued at 40 points. The exam grade cannot be less than 24 points to receive an overall positive grade for the course.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers


Faculty of information Technology

Departments

The following departments are involved in teaching the above discipline

Faculty of information Technology