"Computer technologies and cybersecurity"


The educational program "Computer Technologies and Cybersecurity" is the training of highly qualified managerial personnel with in-depth professional training for various industries covering advanced IT technologies, software security, computer expertise and programming. A computer technology and cybersecurity specialist is an employee engaged in providing computer security at an enterprise to organize the creation, maintenance and protection of an organization's information from cyberattacks, installing and maintaining software at a high security level and monitoring for violations.


The educational program "Computer Technologies and Cybersecurity" provides an opportunity to gain in-depth knowledge in the field of quantum, cloud and network technologies, as well as data analysis, machine learning and neural networks, solve security issues using blockchain technologies, as well as knowledge and application of the principles of monitoring, management and management of company resources and investigation of various IT incidents. This will make it possible to be in demand by specialists in the domestic and international labor markets.


Disciplines


  • Artificial intelligence and data analytics
  • Neural networks;
  • Integration of IT processes;
  • Hardware technologies for SMART systems;
  • The Internet of Things and Big Data analytics;
  • Machine learning;
  • Quantum technologies;
  • Management of computer technology and cybersecurity processes;
  • System analysis and decision-making;
  • Legal support of computer technologies and cybersecurity;
  • Investigation of IT incidents;
  • Cloud Resource Management;
  • Virtualization technologies;
  • Monitoring of information interaction processes;
  • Modeling of computer technology and cybersecurity processes;
  • DevOps;
  • Distributed computing using blockchain.
Core competencies

  • Organization of big data processing;
  • Apply quantum, cloud-based virtual technologies;
  • Manage the project team and their actions, taking into account their capabilities, abilities and motivation;
  • Planning of work on system analysis and control over their execution;
  • Conducting a technical audit of the IT infrastructure and developing the terms of reference;
  • Analysis and monitoring of iOS devices;
  • The use of machine learning algorithms in solving technical problems;
  • Organization, monitoring and legal support of resources using methods to prevent data leaks and protect infrastructure
Leading positions
  • Cloud It Systems Engineer
  • Data Mining Specialist
  • Cloud Computing Specialist
  • Information Security Specialist

EP passport 2023

CED 2023

Версия сайта для слабовидящих