Level of higher education: second (master’s)
Specialty: 125 “Cybersecurity and Information Protection”
Educational components of free choice of vocational training according to the list
| Educational components |
Semester |
Credits |
Syllabuses |
| Agent modeling |
3 |
4,0 |
PDF |
| Models and technologies for ensuring the security of intelligent systems |
3 |
4,0 |
PDF |
| Cyber-physical action modeling |
3 |
4,0 |
PDF |
| Game and system-dynamic modeling of cyber conflicts |
3 |
4,0 |
PDF |
| Artificial Intelligence and Business Analytics |
3 |
4,0 |
PDF |
| Espionage in cyberspace |
3 |
4,0 |
PDF |
| Comprehensive training “Web Application Security”
|
3 |
4,0 |
PDF |
| Comprehensive training “Blockchain: mathematical problems and applications”
|
3 |
4,0 |
PDF |
| Comprehensive training “Cryptography and Cryptanalysis”
|
3 |
4,0 |
PDF |
Educational components of general training according to the list
Ukrainian Studies Educational Components
| Educational components |
Semester |
Credits |
Syllabuses |
| Ethnolinguistic processes in Ukraine |
3 |
3,0 |
PDF |
| Cultural history of Slobodsk Ukraine |
3 |
3,0 |
PDF |
| History of Ukrainian statehood |
3 |
3,0 |
PDF |
Educational component of psychological orientation
| Educational components |
Semester |
Credits |
Силабуси |
| Psychology of leadership in business |
3 |
3,0 |
PDF |
| Psychology of leadership in education |
3 |
3,0 |
PDF |
| Fundamentals of professional psychology |
3 |
3,0 |
PDF |
Educational component of legal direction
| Educational components |
Semester |
Credits |
Syllabuses |
| Legal regulation of innovation activities |
3 |
3,0 |
PDF |
| Information law |
3 |
3,0 |
PDF |
| Copyright and related rights |
3 |
3,0 |
PDF |
Educational component of free choice of scientific and professional direction
| Educational components |
Semester |
Credits |
Syllabuses |
| Presentation and processing of knowledge |
3 |
4,0 |
PDF |
| Security of Internet of Things and Services |
3 |
4,0 |
PDF |
| Smart technology security |
3 |
4,0 |
PDF |
| Advanced administration of server services |
3 |
4,0 |
PDF |
| Security of Client-Server systems |
3 |
4,0 |
PDF |
| Models and analysis of multi-agent systems |
3 |
4,0 |
PDF |
| WEB analytics |
3 |
4,0 |
PDF |
| WEB security |
3 |
4,0 |
PDF |
| Mobile technology security |
3 |
4,0 |
PDF |