Program Coordinator,
Professor
e-mail: a.nazarov06@bk.ru
Can you train to defense your computer more security? Do you understand how cyber security works?
The program focused on the theory and application of modern cyber security methods for solving human and corporation level problems considering cloud technologies. Strong and wide theoretical background provides you various tracks for researching: cyber defense, survey cyber attacks and deep cyber forensic.
Alexey Nazarov, program representative, about Master's program 'Cyber Security'
Basics of Network Technologies - OSI Model, IP (QoS, addressing) Protocols, Network Topologies, Data Communications Technology, Link switching and packet switching, Routing, Virtual Networks, Wireless Networks, Network Equipment Performance Measurement, etc.
Vulnerabilities and Attacks – Backdoor, Denial of service attacks, Direct access attacks, Eavesdropping, Multiplexer, Polymorphic attacks, Fishing, Privilege escalation, Spoofing, Tampering, etc.
Cyber Defense – Security Architecture Security measures (account access control and cryptography, firewalls, intrusion detection system), Vulnerability management, Reducing vulnerabilities, Equipment protection mechanisms (USB dongle, Trusted platform (TPM) modules, computer case intrusion detection, mobile access devices), Secure operating systems, Access control features and lists, etc.
Basics of Information Security in Financial Organizations – Review of international standards for information security. Protected information. Information assets of financial institutions. Access management and registration in financial organizations. Role and mandate access. Processing and protection of personal data in financial organizations, Model of threats and model of the violator. Management of information security risks in financial organizations. Methods of risk calculation. Requirements for providing IS (antivirus, life cycle, cryptography, etc.).
Information Security in the Cloud - Architectural concepts and design requirements, Cloud data security, Security of the cloud platform and infrastructure, Cloud application security, Implementing and building physical infrastructure for the cloud environment, Launching physical infrastructure for the cloud environment, Physical infrastructure management for the cloud, Building logical infrastructure for the cloud environment, Launching logical infrastructure for the cloud, Logical infrastructure management for the cloud, etc.
The only program with full aspects of Cyber Security, from theory to world network security and cyber forensic.
|
Centre of Information Technology and Systems Chair of Intelligent Information Systems and Technology |
|
International Centre for Informatics and Electronics Chair of Intelligent Information Systems and Technology |
Full stack of neural Cyber defense in modern infrastructure. Approaches of various tasks security solution with network infrastructures based on Artificial Intelligence for Cyber Security including: