Basic subjects
Foreign Language Foreign Language for Business Communication Foundations of Russian Statehood Economic and Legal Support of Engineering Activities History of Russia Philosophy Physical Education and Sports Health and Safety
Specialized subjects
Programming technologies and methods in information security tasks Fundamentals of information security Multiservice networks Neural network technologies in information security tasks Computer network administration Hardware security Network deployment and scaling Network programming in information security tasks Operating system security Low-level programming Protection of information from leakage through technical channels Personal data security and secure document management technologies Organizational and legal provision of information security Modern issues of cryptography and cryptanalysis Investigation of computer incidents Cryptographic protocols and standards Audit of information technologies and information security systems Mathematical apparatus and software security analysis tools Development and operation of secure automated systems Intelligent technologies in information security tasks Security of cyber-physical systems OSINT technologies Protecting information in wireless networks
Program Overview
During education process students will learn how to: 1) Assess information security risks, perform penetration testing (pentest), and conduct software vulnerability research using reverse engineering methods; 2) Search for and eliminate weaknesses in industrial networks, groups of mobile robots and swarms of unmanned vehicles; 3) Ensure the protection of personal data, to restore systems operation in case of network failures and hacks; Program in various languages (C/C++, assembler, Python, JS); 4) Use automated security analysis systems (MaxPatrol, XSpider, Nesus, Metasploit); 5) Use software and hardware to organize the protection of industrial-level information developed by such companies as Cisco, CheckPoint, Positive Technologies, SearchInform, Infotex, Aladdin, InfoWatch, RusBITech; 6) Develop new methods of intrusion detection and prevention using artificial intelligence and machine learning tools; 7) Apply legislation in the field of information security; 8) Master new technologies in related fields of science, technology and business; 9) Launch own technology business in the field of information security.
Prospects. Career & Employment
Graduates of the program can work in different companies as Avira GmbH, Intel Corp., Parallels, Inc., Jet Infosystems, InfoTeCS. Others can also serve in the Ministry of Internal Affairs, the cyber forces of the Ministry of Defense.
Why is it important to pursue a higher education?
The program is aimed at training the following specialists: Information Security Specialist (CISO), Security Operations Center Analyst, Specialist in the protection of cyber-physical systems, including unmanned aerial vehicles and industrial infrastructure, Information Security Systems Software Engineer, Security Analysis Specialist (pentester), Administrator of local area network security, Specialist in personal data protection, etc.