State University "Kyiv Aviation Institute" Logo

Postgraduate Security of information and communication systems (MSc)

State University "Kyiv Aviation Institute"
Kyiv
Faculty of Cybersecurity, Computer and Software Engineering

Entrance Exam Description

During the selection process we examine the competency of the applicant in two ways:
The faculty decides about the eligibility of the applicant by examining the documents of previous studies (degree, subject, results). This is followed by an entrance exams that evaluate the level of study-language and basic subjects depends on speciality.
The exams can be conducted online. In order to validate the entrant’s person, exams taken remotely are recorded on video, as is the person verification process. The recording is archived for at least five years on University’s grounds and the link to that recording is available in the united base of Ministry of Education of Ukraine.

Program Structure

Semester 1 — Foundations & Core Security Knowledge
- Computer Systems & Network Fundamentals — you study how computer systems, networks and communication technologies work, building a necessary base for secure system design.
- System Software & Operating Systems Security — understanding OS architecture, system software vulnerabilities, and secure configuration / maintenance.
- Cryptography & Information Protection Methods — fundamentals of cryptography, encryption, secure data storage and communication, access control.
- Theory of Information & Coding / Data Security Theory — mathematical and theoretical background to understand data coding, information security principles, and system integrity.

Semester 2 — Applied Security, Network & Systems Protection
- Network & Communication Security — how to secure computer networks and communication systems: network protocols, secure network design, protection against cyber‑attacks.
- Risk Analysis, Vulnerability Detection & Incident Response — learn to identify threats, detect vulnerabilities, respond to security incidents, and manage security incidents in organizations.
- Security Management Systems & Regulatory / Legal Aspects — studying how to manage security policies, compliance with laws/standards, information security governance.
- Secure Software / System Design & Secure Programming Practices — ensuring that software, system architecture, and system deployment are secure by design; applying secure coding, system hardening, secure configurations.

Semester 3 — Specialization, Research & Master’s Thesis / Project
- Advanced / Elective Topics in Cybersecurity — depending on your interest: advanced cryptosystems, secure communications, cloud security, secure networks, data protection, or specialized security for industries (e.g. telecom, aviation, infrastructure).
- Practical / Laboratory Work — Security Implementation & Protection Systems — applying your skills on real systems: network hardening, penetration testing, system audits, implementation of security tools.
- Research Methods & Security Project Design — preparing for your master’s project: learning research methodology, planning, analysis, documentation and system evaluation.
- Master’s Thesis / Final Project — you carry out a substantial work: design or analyze a secure information or communication system; research a security problem; propose and test security solutions.

Overview

This program teaches you how to design, operate and protect information systems and networks — including computer systems, corporate networks, and communication infrastructure — against cyber threats. You will learn core principles of information security: system software, network security, cryptography, risk analysis, vulnerability detection, access control, and secure design of ICT systems. The goal is to prepare specialists capable of managing and defending information and communication systems — in any organisation, from companies to public institutions.

Career Opportunities

After finishing this MSc you can work as an information security engineer, security analyst, network / system security administrator, or cybersecurity specialist — protecting corporate networks, data systems, and communication infrastructure. You can also aim for roles like security auditor, penetration tester, security system designer, or researcher in cybersecurity — especially relevant for sectors requiring strong information protection (IT companies, telecom, finance, infrastructure, public agencies). Because the program gives research-level preparation, you also have the option to continue your studies at PhD / research level after graduation.

Apply now! Fall Semester 2026/27
Application deadline
31 Oct 2026 12:48
Studies commence
01 September 2026
Share