| Study Location | Kyiv |
|---|---|
| Academic Field | F5 Cybersecurity and information protection |
| Type | Postgraduate, Full time (on-line study is available) |
| Nominal Duration | 1,5 years (90 ECTS) |
| Study Language | English |
| Awards | Master of Cybersecurity and information protection |
| Entry qualification | The Bachelor's degree diploma is required. Compulsory entrance exam. The entry qualification documents are accepted in English (except for documents issued in Ukraine upon completion of studies at local educational institutions) . In most cases you can request a suitable transcript from your school. If this is not the case, you will need official translations along with verified copies of the original. You must take the original & legalized (according to the international agreements) entry qualification documents along with you when you finally enter the university. |
|---|
| Territory requirements | General entry requirement - Student visa. Citizens of the Russia, Iran, Belarus and North Korea who do not hold a permanent residence permit in Ukraine may be admitted for studies only with an individual authorization from the Ministry of Education and Science of Ukraine. |
|---|
| Language Requirements | English (B1/B2) |
|---|
Entrance Exam Description
During the selection process we examine the competency of the applicant in two ways:
The faculty decides about the eligibility of the applicant by examining the documents of previous studies (degree, subject, results). This is followed by an entrance exams that evaluate the level of study-language and basic subjects depends on speciality.
The exams can be conducted online. In order to validate the entrant’s person, exams taken remotely are recorded on video, as is the person verification process. The recording is archived for at least five years on University’s grounds and the link to that recording is available in the united base of Ministry of Education of Ukraine.
Program Structure
Semester 1 — Foundations of Cybersecurity & Information Protection
- Introduction to Information & Cybersecurity Systems — you learn basic principles: how data and information systems can be protected, what threats exist, and how protection systems are built.
- Legal, Regulatory and Standards Framework in Cybersecurity — you study laws, regulations and international / national standards that govern information security and data protection.
- Cryptographic Methods & Technical Protection of Information — you learn cryptography, encryption, secure communications and how to implement technical means of data protection.
- Fundamentals of Information Systems & Secure Data Processing — you study how data is processed safely, how systems need to be structured for secure operations, and basics of secure software/hardware design.
Semester 2 — Advanced Security, Analysis & Risk Management
- Threat Detection, Security Audit & Vulnerability Analysis — you learn methods for detecting leaks, security breaches, analyzing vulnerabilities, and auditing systems for safety.
- Access Control, Authentication and Secure Systems Design — you study how to control who can access data/systems, implement security policies, and design secure and reliable system architectures.
- Security Management Systems & Incident Response — you learn how to organize, manage, and respond to security incidents, ensuring compliance and protection in organizations.
- Modern Information and Communication Technologies — Secure Implementation — courses on secure network design, secure communication channels, safe data transmission and ICT security tools.
Semester 3 — Specialization, Automation & Master’s Project / Thesis
- Automated Data-Processing Protection & Secure Automation Systems — you learn how to build automated systems that are secure by design, including secure automation of information processing, data flows, and system operations.
- Research Methods & Security Technologies Innovation — you study research methodology, new trends in cybersecurity (cryptography, secure networks, data protection technologies), prepare for final project.
- Master’s Thesis / Final Project — Cybersecurity System or Research — you design or analyze a real or hypothetical information security system, or conduct research into cybersecurity technologies, demonstrating your knowledge and readiness for professional work.
Overview
The program teaches you how to protect information — covering everything from cryptography and secure communications to data protection, information security management, and detection of cyber threats. You study the technical, legal, and organizational aspects of information security and learn modern cybersecurity technologies and standards. The program gives you theoretical knowledge and practical skills to build, manage, and defend secure information systems. With this master’s degree, you’ll be prepared for complex tasks in IT-security, cyberdefense, data protection — which are in high demand worldwide.
Career Opportunities
After graduation you can work as an information/cybersecurity specialist, protecting data and information systems in companies, governmental or private organizations. You may find jobs as a security engineer, security system designer or auditor, specialist in cryptography and secure communications, or manager of information security systems. You could also become a research or development specialist in cybersecurity — working on security solutions, cryptography, secure automation and system protection. Because cybersecurity is increasingly important globally, your skills will be relevant in many industries — IT, telecoms, government, finance, infrastructure and more.