Level of higher education: first (bachelor’s)
Specialty: 125 “Cybersecurity and Information Protection”
Specialized training
Profiled package of disciplines 01 “Artificial intelligence in security systems”
Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
Ethical hacking |
4 |
3,0 |
PDF |
PDF |
Date of mining |
4 |
3,0 |
PDF |
PDF |
Mathematical foundations of artificial intelligence
|
5 |
3,0 |
PDF |
PDF |
Python for artificial intelligence and machine learning |
6 |
4,0 |
PDF |
PDF |
Genetic algorithms |
7 |
3,0 |
PDF |
PDF |
Python for internet things |
8 |
3,0 |
PDF |
PDF |
Systems engineering |
8 |
3,0 |
PDF |
PDF |
Profiled package of disciplines 02 “Blockchain technology and security of banking systems”
Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
Decentralised systems |
4 |
3,0 |
PDF |
PDF |
Risk management |
4 |
3,0 |
PDF |
PDF |
Blockchain: basics and application examples |
5 |
3,0 |
PDF |
PDF |
Security of banking systems |
6 |
4,0 |
PDF |
PDF |
Protecting critical infrastructure facilities |
7 |
3,0 |
PDF |
PDF |
Organising document management with restricted access |
8 |
3,0 |
PDF |
PDF |
Security in social networks |
8 |
3,0 |
PDF |
PDF |
Profiled package of disciplines 03 “Innovation Campus”
Освітні компоненти |
Semester |
Credits |
Syllabuses |
Syllabus |
Basics of cybersecurity |
4 |
3,0 |
PDF |
PDF |
Development of corporate information systems (part 1), (part 2) |
4, 5 |
3,0/3,0 |
PDF |
PDF |
Databases for corporate information systems |
6 |
4,0 |
PDF |
PDF |
Architecture of corporate information systems |
7 |
3,0 |
PDF |
PDF |
Security and audit of wireless and mobile networks |
8 |
3,0 |
PDF |
PDF |
Protecting critical infrastructure facilities |
8 |
3,0 |
PDF |
PDF |
Disciplines of free choice of a student of specialized training
Educational components |
Semester |
Credits |
Syllabuses |
Syllabus |
Legal regulation of information security |
3 |
4,0 |
PDF |
PDF |
Intellectual property for security systems |
3 |
4,0 |
PDF |
PDF |
Design templates |
3 |
4,0 |
PDF |
PDF |
Methods and technologies of information warfare |
4 |
4,0 |
PDF |
PDF |
Protecting e-commerce and multiservice systems |
4 |
4,0 |
PDF |
PDF |
Databases with SQL and Python |
4 |
4,0 |
PDF |
PDF |
Security at DEVOPS |
5 |
4,0 |
PDF |
PDF |
Fundamentals of planning and administration of information resource access services |
5 |
4,0 |
PDF |
PDF |
Risk theory in cybersecurity |
5 |
4,0 |
PDF |
PDF |
Cryptanalysis methods |
6 |
4,0 |
PDF |
PDF |
Internet science. Navigation in complex systems |
6 |
4,0 |
PDF |
PDF |
Development of server applications (Java Spring Boot) |
6 |
4,0 |
PDF |
PDF |
Neural networks |
6 |
4,0 |
PDF |
PDF |
Cloud security |
6 |
4,0 |
PDF |
PDF |
Testing mobile applications |
6 |
4,0 |
PDF |
PDF |
Administering UNIX-like systems |
7 |
4,0 |
PDF |
PDF |
Organisational support for information security |
7 |
4,0 |
PDF |
PDF |
IT project management and security |
7 |
4,0 |
PDF |
PDF |
Security and audit of wireless and mobile networks |
7 |
4,0 |
PDF |
PDF |
Business intelligence |
7 |
4,0 |
PDF |
PDF |
Evolutionary programming |
7 |
4,0 |
PDF |
PDF |
Bachelors 125 Elective Disciplines (2023)
POLL Google Docs
КАТАЛОSYLLABUS (МИНУЛІ РОКИ)