Security of information and communication systems in the economy 46 months Undergraduate Program By State University of Trade and Economics |Top Universities

Security of information and communication systems in the economy

Program Duration

46 monthsProgram duration

Application Deadline

31 Aug, 2024Application Deadline

Scholarship

YesScholarships

Main Subject Area

Computer Science and Information SystemsMain Subject Area

Program overview

Main Subject

Computer Science and Information Systems

Degree

BIT

Study Level

Undergraduate

Study Mode

Blended

The purpose of the educational programme: formation of a modern system of professional knowledge and skills in the field of security of information and communication systems of the enterprise (organization), particular in the economy. Formation of a person capable on the basis of acquired integrated, general and professional competencies to work successfully in the field of IT technologies, ensuring the security of information and communication systems of the enterprise (organization), particular in the economy.  

Objects of professional activity of graduates: - informatization objects, including computer, automated, telecommunication, information, information-analytical, informationtelecommunication systems, information resources and technologies; – technologies for ensuring information security; – processes of information and/or cyber security management of objects to be protected. The purpose of the training is to prepare specialists who are able to use and implement information and/or cyber security technologies. The theoretical content of the subject area Knowledge – the legislative, regulatory and legal framework of Ukraine and the requirements of relevant international standards and practices regarding professional activity; – principles of supporting systems and complexes of information and/or cyber security; – theories, models and principles of managing access to information resources; – theories of information and/or cyber security management systems; – methods and means of identifying, managing and identifying risks; – methods and means of assessment and ensuring the required level of information security; – methods and means of technical and cryptographic protection of information; – modern information and communication technologies; – modern hardware and software of information and communication technologies; – automated design systems. Methods, methodologies and technologies: Methods, techniques, information and communication technologies and other technologies for ensuring information and/or cyber security. Instruments and equipment: – systems for developing, ensuring, monitoring and controlling information and/or cyber security processes; - modern software and hardware support of information and communication technologies.

Educational-professional. It is aimed at training specialists who combine fundamental mathematical, information and economic principles with practical skills in the field of cyber security and information technologies, applying algorithms, methods and technologies of software development and cryptographic methods of information protection.

Higher education in the Subject Area 125 "Cyber security and information protection" in the field of information technologies. The ability to organize and maintain a set of measures to ensure the security of information systems and networks of the enterprise (organization), taking into account their legal and economic justification, technical implementation, prevention of possible external influences, probable threats and the application of information protection technologies. Keywords: security of information and telecommunication systems; cryptographic methods of information protection; number theory; security of operating systems and networks.

The programme creates the following chain: tasks, knowledge, skills, abilities, professional activity, professional context, work area, interests, professional styles, professional values, related professions, salary. The modular principle is used to reveal the essence of the listed components. The integration of software and hardware for detecting, monitoring and information security, information technology for information protection in information and communication systems of the enterprise, particularly in the economy, data storage technologies in a single information space and the implementation of cybercrime countermeasures.

Program overview

Main Subject

Computer Science and Information Systems

Degree

BIT

Study Level

Undergraduate

Study Mode

Blended

The purpose of the educational programme: formation of a modern system of professional knowledge and skills in the field of security of information and communication systems of the enterprise (organization), particular in the economy. Formation of a person capable on the basis of acquired integrated, general and professional competencies to work successfully in the field of IT technologies, ensuring the security of information and communication systems of the enterprise (organization), particular in the economy.  

Objects of professional activity of graduates: - informatization objects, including computer, automated, telecommunication, information, information-analytical, informationtelecommunication systems, information resources and technologies; – technologies for ensuring information security; – processes of information and/or cyber security management of objects to be protected. The purpose of the training is to prepare specialists who are able to use and implement information and/or cyber security technologies. The theoretical content of the subject area Knowledge – the legislative, regulatory and legal framework of Ukraine and the requirements of relevant international standards and practices regarding professional activity; – principles of supporting systems and complexes of information and/or cyber security; – theories, models and principles of managing access to information resources; – theories of information and/or cyber security management systems; – methods and means of identifying, managing and identifying risks; – methods and means of assessment and ensuring the required level of information security; – methods and means of technical and cryptographic protection of information; – modern information and communication technologies; – modern hardware and software of information and communication technologies; – automated design systems. Methods, methodologies and technologies: Methods, techniques, information and communication technologies and other technologies for ensuring information and/or cyber security. Instruments and equipment: – systems for developing, ensuring, monitoring and controlling information and/or cyber security processes; - modern software and hardware support of information and communication technologies.

Educational-professional. It is aimed at training specialists who combine fundamental mathematical, information and economic principles with practical skills in the field of cyber security and information technologies, applying algorithms, methods and technologies of software development and cryptographic methods of information protection.

Higher education in the Subject Area 125 "Cyber security and information protection" in the field of information technologies. The ability to organize and maintain a set of measures to ensure the security of information systems and networks of the enterprise (organization), taking into account their legal and economic justification, technical implementation, prevention of possible external influences, probable threats and the application of information protection technologies. Keywords: security of information and telecommunication systems; cryptographic methods of information protection; number theory; security of operating systems and networks.

The programme creates the following chain: tasks, knowledge, skills, abilities, professional activity, professional context, work area, interests, professional styles, professional values, related professions, salary. The modular principle is used to reveal the essence of the listed components. The integration of software and hardware for detecting, monitoring and information security, information technology for information protection in information and communication systems of the enterprise, particularly in the economy, data storage technologies in a single information space and the implementation of cybercrime countermeasures.

Admission requirements

31 Aug 2024
46 Months
Sep
  • Candidates are required to submit an essay(s) for acceptance

Tuition fee and scholarships

One of the important factors when considering a master's degree is the cost of study. Luckily, there are many options available to help students fund their master's programme. Download your copy of the Scholarship Guide to find out which scholarships from around the world could be available to you, and how to apply for them.

In this guide you will find:
opportunities

Where to look for scholarship opportunities

how_to

How to apply to scholarships relevant to you

list

A list of available scholarships around the world

checklist

A scholarship application checklist

banner
download_icon Download Scholarship Guide

More programs from the university

Banking Business

::type_cta_button:: View Details

Banking Business

::type_cta_button:: View Details

Corporate Finance

::type_cta_button:: View Details

Customs Affairs

::type_cta_button:: View Details

Customs Affairs

::type_cta_button:: View Details

Digital Economy

::type_cta_button:: View Details

Digital Economy

::type_cta_button:: View Details

Digital Finance

::type_cta_button:: View Details

Management

::type_cta_button:: View Details

Marketing

::type_cta_button:: View Details

Public Finances

::type_cta_button:: View Details

Sports Management

::type_cta_button:: View Details

Sports Management

::type_cta_button:: View Details

Trade Business

::type_cta_button:: View Details

Trade Business

::type_cta_button:: View Details

Trade Economics

::type_cta_button:: View Details

Trade Management

::type_cta_button:: View Details

Agribusiness

::type_cta_button:: View Details

Brand Management

::type_cta_button:: View Details

Brand Management

::type_cta_button:: View Details

Brand Management

::type_cta_button:: View Details

Brand Management

::type_cta_button:: View Details

Corporate Finance

::type_cta_button:: View Details

Customs Affairs

::type_cta_button:: View Details

Customs Affairs

::type_cta_button:: View Details

Digital Economy

::type_cta_button:: View Details

Digital Economy

::type_cta_button:: View Details

Digital Marketing

::type_cta_button:: View Details

Public Finance

::type_cta_button:: View Details

Public Finance

::type_cta_button:: View Details

State Audit

::type_cta_button:: View Details

Trade Management

::type_cta_button:: View Details

Trade Marketing

::type_cta_button:: View Details

Trade Marketing

::type_cta_button:: View Details

FAQs

details at the link https://knute.edu.ua/blog/read/?pid=38710&uk
details at the link https://knute.edu.ua/blog/read/?pid=38710&uk
details at the link https://knute.edu.ua/blog/read/?pid=38710&uk
details at the link https://knute.edu.ua/blog/read/?pid=38710&uk
details at the link https://knute.edu.ua/blog/read/?pid=38710&uk
Undergrad programs 14294