The goal of the program is to prepare highly qualified specialists capable of analyzing information risks of the company, developing and implementing measures to prevent them requiring an advanced level of qualification. They are also responsible for conducting security analysis of computer systems. Security specialists also conduct training and consultations with employees on information security issues, and develop regulatory and technical documentation. Professionalism of future masters is provided by the knowledge of mathematical modeling, modern fault-tolerant network technologies and computer complexes, systems and networks, processes of information security management of protected data centers; knowledge in the field of normative-legal provision of information security.

  • OJSC Russian Railways
  • JSC SRIAC
  • Almaz-Antey VKO Concern
  • TSNII VVKO MORF
  • PJSC Sberbank
  • PJSC MTS
  • JSC ICST
  • Informzaschita JSC
  • JSC CROC
  • JSC COMCOR
  • JSC Biznesinform
  • JSC Milandr
  • Positive Technologies and others
  • Conducting scientific research in the field of modern information security technologies
  • Creation and maintenance of secure information systems requiring an advanced level of qualification
  • Development of design solutions for information protection in automated systems
  • Development of operational documentation for information protection systems of automated systems
  • Development of software and hardware-software means for information protection systems of automated systems
  • Development of software and hardware means for information protection against unauthorized access
  • Design of means and systems of informatization in protected version
  • Teaching activities in various IT training areas
  • Designing secure computer networks
  • Secure Data Centers
  • Information Security Management
  • Information protection in networks
  • Methods of researching the security of informatization objects
  • Neural networks in management and decision making
  • Fault-tolerant computer architectures
  • Security of operating systems
  • Mathematical models of computer systems security
  • Telecommunication equipment of secure networks