Specialty 125 “Cybersecurity” (first level)
| Name of the academic discipline according to the curriculum | Availability information (“+”, “-” or no need) | ||||||||
| educational content | plans for practical (seminar) classes | laboratory tasks | tasks for independent work of students | questions, tasks, assignments or cases for current and final control | tasks for comprehensive control work | ||||
| Ukrainian language (for professional purposes) | Program | + | no need | + | Current | + | |||
| Foreign language (by professional direction) | Programa | + | no need | + | + | ||||
| Socio-economic history of Ukraine | Programa | + | no need | + | + | ||||
| Philosophy | Programma | + | no need | + |
Current
Summary
|
+ | |||
| Foreign language of academic and professional communication | Programma | + | no need | + |
Summary
|
+ | |||
| Intellectual property | Programa | + | no need | + | + | ||||
| Training course “Life Safety” | Programa | + | no need | + | + | ||||
| Training course “Fundamentals of occupational safety” | Programa | + | no need | + | + | ||||
| Physics | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Mathematical foundations of cryptology | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Higher mathematics | Programma | + | + | + |
Current
Summary
|
+ | |||
| Fundamentals of information theory | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Higher Mathematics (Special Chapters) | Programma | + | + | + |
Current
Summary
|
+ | |||
| Fundamentals of construction and functioning of microprocessor systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Fundamentals of mathematical modeling | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Programming technologies | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Basics of cryptographic protection | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Basics of technical information protection | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Information security management | Programma | + | + | + |
Current
Summary
|
+ | |||
| Security in information and communication systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Ensuring information security | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Information systems and Internet technologies | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Fundamentals of building and protecting modern operating systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Fundamentals of planning and administering information resource access services | Programma | no need | + | + | + | ||||
| Comprehensive information protection systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Fundamentals of national security | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Basics of steganographic information protection | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Economics and business | Programma | + | no need | + | + | ||||
| Protection of e-commerce and multi-service systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| State information security | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Corporate networks and access systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Security and auditing of wireless and mobile networks | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Fundamentals of planning and administering information resource access services | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Administering Unix-like systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Network programming | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Expert systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Banking systems security | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Designing next-generation network security systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Security of Internet information services | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Attack detection and countermeasure systems | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Risk theory | Programma | no need | + | + |
Current
Summary
|
+ | |||
| Database organization and storage | Programma | no need | + | + |
Current
Summary
|
+ | |||