Level of higher education: first (bachelor’s)
Specialty: 125 “Cybersecurity and Information Protection”
Specialized training
Profiled package of disciplines 01 “Artificial intelligence in security systems”
| Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
| Ethical hacking |
4 |
3,0 |
PDF |
PDF |
| Date of mining |
4 |
3,0 |
PDF |
PDF |
| Mathematical foundations of artificial intelligence
|
5 |
3,0 |
PDF |
PDF |
| Python for artificial intelligence and machine learning |
6 |
4,0 |
PDF |
PDF |
| Genetic algorithms |
7 |
3,0 |
PDF |
PDF |
| Python for internet things |
8 |
3,0 |
PDF |
PDF |
| Systems engineering |
8 |
3,0 |
PDF |
PDF |
Profiled package of disciplines 02 “Blockchain technology and security of banking systems”
| Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
| Decentralised systems |
4 |
3,0 |
PDF |
PDF |
| Risk management |
4 |
3,0 |
PDF |
PDF |
| Blockchain: basics and application examples |
5 |
3,0 |
PDF |
PDF |
| Security of banking systems |
6 |
4,0 |
PDF |
PDF |
| Protecting critical infrastructure facilities |
7 |
3,0 |
PDF |
PDF |
| Organising document management with restricted access |
8 |
3,0 |
PDF |
PDF |
| Security in social networks |
8 |
3,0 |
PDF |
PDF |
Profiled package of disciplines 03 “Innovation Campus”
| Освітні компоненти |
Semester |
Credits |
Syllabuses |
Syllabus |
| Basics of cybersecurity |
4 |
3,0 |
PDF |
PDF |
| Development of corporate information systems (part 1), (part 2) |
4, 5 |
3,0/3,0 |
PDF |
PDF |
| Databases for corporate information systems |
6 |
4,0 |
PDF |
PDF |
| Architecture of corporate information systems |
7 |
3,0 |
PDF |
PDF |
| Security and audit of wireless and mobile networks |
8 |
3,0 |
PDF |
PDF |
| Protecting critical infrastructure facilities |
8 |
3,0 |
PDF |
PDF |
Disciplines of free choice of a student of specialized training
| Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
| Legal regulation of information security |
3 |
4,0 |
PDF |
PDF |
| Intellectual property for security systems |
3 |
4,0 |
PDF |
PDF |
| Design templates |
3 |
4,0 |
PDF |
PDF |
| Methods and technologies of information warfare |
4 |
4,0 |
PDF |
PDF |
| Protecting e-commerce and multiservice systems |
4 |
4,0 |
PDF |
PDF |
| Databases with SQL and Python |
4 |
4,0 |
PDF |
PDF |
| Security at DEVOPS |
5 |
4,0 |
PDF |
PDF |
| Fundamentals of planning and administration of information resource access services |
5 |
4,0 |
PDF |
PDF |
| Risk theory in cybersecurity |
5 |
4,0 |
PDF |
PDF |
| Cryptanalysis methods |
6 |
4,0 |
PDF |
PDF |
| Internet science. Navigation in complex systems |
6 |
4,0 |
PDF |
PDF |
| Development of server applications (Java Spring Boot) |
6 |
4,0 |
PDF |
PDF |
| Neural networks |
6 |
4,0 |
PDF |
PDF |
| Cloud security |
6 |
4,0 |
PDF |
PDF |
| Testing mobile applications |
6 |
4,0 |
PDF |
PDF |
| Administering UNIX-like systems |
7 |
4,0 |
PDF |
PDF |
| Organisational support for information security |
7 |
4,0 |
PDF |
PDF |
| IT project management and security |
7 |
4,0 |
PDF |
PDF |
| Security and audit of wireless and mobile networks |
7 |
4,0 |
PDF |
PDF |
| Business intelligence |
7 |
4,0 |
PDF |
PDF |
| Evolutionary programming |
7 |
4,0 |
PDF |
PDF |
Bachelors 125 Elective Disciplines (2023)
POLL Google Docs
КАТАЛОSYLLABUS (МИНУЛІ РОКИ)