Educational program System of Technical Protection of Information and Automation of its Processing

Within the framework of the educational program “Technical Information Protection Systems and Automation of its Processing” in the speciality “Cybersecurity and Information Protection”, students are trained to:
– solve complex tasks and problems in the field of cybersecurity and in the field of conducting special research to identify technical channels of information leakage, as well as prevent leakage, blocking and violation of information integrity by developing, implementing and supporting technical information protection complexes as part of a comprehensive protection system at information activity facilities.
– conduct a comprehensive analysis of the effectiveness of cybersecurity measures and technical information protection systems and develop methods and means of increasing their effectiveness.
The purpose of the educational program is to provide students with knowledge, skills and abilities in the implementation and application of cybersecurity technologies and technical information protection; acquire competencies in using research methods and design systems and complexes for ensuring cybersecurity and technical information protection.


The main skills and competencies that a master of the educational program “Technical Information Protection Systems and Automation of its Processing” will possess:
1. The ability to reasonably apply, integrate, develop and improve modern information technologies, physical and mathematical models, as well as technologies for creating and using applied and specialized software to solve professional tasks in the field of information security and/or cybersecurity.
2. The ability to develop, implement and analyze regulatory documents, regulations, instructions and requirements of a technical and organizational nature, as well as integrate, analyze and use the best global practices and standards in professional activities in the field of information security and/or cybersecurity.
3. The ability to research, develop and support methods and means of information security and/or cybersecurity at information activity facilities and critical infrastructure.
4. Ability to analyze, develop and maintain an information security and/or cybersecurity management system of an organization, to form an information security strategy and policies taking into account domestic and international standards and requirements.
5. Ability to research, system analysis and ensure the continuity of business/operational processes in order to identify vulnerabilities of information systems and resources, analyze risks and determine their impact assessment in accordance with the established information security and/or cybersecurity strategy and policy of the organization.
6. Ability to analyze, control and ensure a system for managing access to information resources in accordance with the established information security and/or cybersecurity strategy and policy of the organization.
7. Ability to research, develop and implement methods and measures to counter cyber incidents, implement management, control and investigation procedures, and provide recommendations for the prevention and analysis of cyber incidents in general.
8. Ability to research, develop, implement and support methods and means of cryptographic and technical protection of information at information activity facilities and critical infrastructure, in information systems, as well as the ability to assess the effectiveness of their use, in accordance with the established strategy and policy of information security and/or cybersecurity of the organization.
9. Ability to analyze, develop and support a system of auditing and monitoring the effectiveness of the functioning of information systems and technologies, business/operational processes in the field of information security and/or cybersecurity of the organization as a whole.
10. Ability to conduct scientific and pedagogical activities, plan training, monitor and support work with personnel, and make effective decisions on information security and/or cybersecurity issues.
11. Ability to detect and localize sources of dangerous signals in conditions of limited a priori data on their physical nature and characteristics against the background of strong interfering signals
12. Ability to conduct a comprehensive analysis of the effectiveness of technical means, devices and information protection systems, and develop methods for increasing their effectiveness.


A graduate of the educational program “Technical Information Protection Systems and Automation of Its Processing” can work in the following positions:
(according to the State Classifier of Professions DK 003:2010 with Amendment No. 10, corresponding to classification groups: 2139.2)
– analyst of information protection systems and vulnerability assessment;
– professional in organizing information security;
– professional in organizing information protection with limited access;
– lecturer at universities and higher education institutions.
– Security Specialist (Information and Communication Technologies)
– Cybersecurity Infrastructure Support Specialist
– Cybersecurity Incident Response Specialist
– Information Security Systems Testing Specialist
– Information Security Technical Specialist
– Security Specialist in information