Basic subjects
Information technology security Secure information systems Project management Research project Information security management Psychology of personal resource management Professional and academic communication Research methodology
Specialized subjects
Modern technologies and systems for virtualization of computer networks Administration of virtualized computer networks Administration of virtualized computing machines based on Linux containers Information security of virtualized computer networks Security analysis of virtualized computer networks
Program Overview
Students will learn about the following research areas: principles of operation and features of virtualized computer networks, methods of deploying and administering virtual infrastructure using Linux containers and container orchestration systems (Podman, Docker Compose); principles of operation and methods of configuration management and application deployment (Ansible); methods and problems of ensuring security using container isolation mechanisms and Linux OS capabilities; methods and problems of analyzing the security of virtualized computer networks as a unified virtual computing environment
Prospects. Career & Employment
Program graduates are in demand in companies and organizations that actively apply modern Linux container virtualization technology in their business processes and operations. Among the employers of our graduates are: TELE2; Datum Group; DOM.RF; PZh19; Kaspersky Lab; Rostelecom PJSC; Tinkoff Bank JSC; Dunice and other industrial enterprises and scientific institutions.
Why is it important to pursue a higher education?
The program prepares specialists in the following areas: protected computer systems and their components for processing, storing, and transmitting information; information security management systems for computer systems; methods and tools for information protection in computer systems; mathematical models of processes that arise during the protection of information processed in computer systems; methods and systems for monitoring the effectiveness of information protection in computer systems; threat models and information security violator models in distributed information systems; remote administration of operating systems and database systems in distributed information systems; security auditing of information technology resources; coordination of activities of departments and information security specialists at enterprises, institutions, and organizations. Students acquire competencies in the field of information protection, including through modern cryptographic technologies.