Master of Cybersecurity
Official Syllabus: Program goals: The objective of the program is to prepare highly qualified and competitive cybersecurity specialists equipped with knowledge and skills that meet international standards and labor market demands, both locally and globally. The program provides students with a solid and systematic understanding of both theoretical foundations and practical applications in cybersecurity, enabling graduates to independently and effectively address the challenges and issues in the modern technological world related to cybersecurity. Upon successful completion of the program, graduates will be qualified to work in various roles, including but not limited to: security auditor, analyst, cloud security specialist, cybersecurity operations specialist, software security engineer, penetration testing expert, and other related positions. Methods for Attaining Learning Outcomes: Lecture–seminar Interactive lectures Explanatory method Demonstration method Practical work Critical analysis Teamwork / Group work Problem-oriented exercises Case study and analysis Literature review Working with textbooks Searching for relevant materials in electronic format or library Written work method Verbal (oral) method Discussions / Debates Simulation Role-playing Induction, deduction, analysis and synthesis Presentation Learning outcomes Knowledge and understanding Describes the requirements of software and cloud security, as well as the methods of threat modeling within relevant cybersecurity contexts. Discusses the role, functions, and risk assessment methods of auditing. Describes the core principles of systems theory and the systems approach, explains the processes involved in assessing the operability and reliability of complex systems. Skills Develops security requirements for software systems in accordance with cybersecurity standards and best practices; Ensures the security of cloud-based solutions, including network configuration, identity and access management, infrastructure protection, and data security; Plans and conducts audits of information systems to evaluate compliance, performance, and risk; Identifies cybersecurity threats and responds appropriately to related incidents. Responsibility and autonomy Independently addresses security-related issues and develops appropriate problem-solving strategies; Ensures compliance with organizational governance structures, IT and information security policies, procedures and standards; Adheres to security protocols and safeguards the security of cloud-based solutions, networks and infrastructure. Program Administration Date of approval: 02-28-2025Approval protocol number: 3PCD6067-01Date of program update:Update protocol number: Program details Teaching Process Characteristics The program consists of 120 ECTS credits, with 102 ECTS allocated to core subjects and 18 ECTS to elective subjects. The total number of elective subjects amounts to 102 ECTS, from which the student must choose 18 ECTS. In the core part of the program, the student is required to complete a Master’s thesis (30 ECTS). Program Core (Course Titles Only) Information Security Management – Governance, Risk and Compliance Cyber Threat Analysis, Research and Education Cybersecurity in Computing Physical Security Application Security Network Security Structural Analysis of Systems Mathematical Statistics Cloud Security Offensive Cybersecurity Cyber Threat Intelligence Manual Testing and Automation of Software Master’s Project Program Elective (Course Titles Only) Cybersecurity Architecture and Management in the Microsoft Ecosystem AWS Cloud Infrastructure Security IAC (Infrastructure as Code) Terraform IAC (Infrastructure as Code) Bicep Operation System Linux Cryptology Flask Agile Software Development Project Management IT Service Strategy and Design Transition of IT Services Personal Data Protection in the Digital Age IT Project Management Security Methods in Blockchain and Cryptocurrency Systems Incident Response and Forensics Logging and Monitoring Big Data Systems Artificial Intelligence Based Machine Learning Algorithms
