Cybersecurity
Bachelor’s program
Duration:
Country:
Language of instruction:
Tuition Fee:
4 years
Uzbekistan
English
25 400 000 UZS per year
About the program
This program is designed to prepare specialists in cybersecurity engineering. The curriculum is continuously updated to reflect modern technologies and industry requirements. The program combines theoretical knowledge with practical experience, including internships and real-world projects.
Learning tracks
Within the Cybersecurity program, all students will complete two learning tracks: the core track and an elective track. The core track will train students to become consultants in information security risk management, capable of performing initial risk assessments, implementing security control measures, participating in policy development, and responding to incidents.

Additionally, each student in the program will choose one of three elective tracks:
01
02
Security Operations
Cloud Security and DevSecOps
Security Operations Engineers monitor and analyze security systems, respond to incidents, implement and maintain protection tools, develop and update security procedures, evaluate vulnerabilities, and collaborate with IT teams to secure infrastructure.
Cloud Security and DevSecOps Engineers design and implement secure cloud architectures, integrate security practices into DevOps, automate testing and deployment, manage protection tools, assess risks, ensure compliance with regulations, and collaborate with developers to implement security measures throughout the application lifecycle.
03
AI Application Security
AI Application Security Engineers design and implement machine learning models for threat detection, integrate AI solutions into protection systems, analyze vulnerabilities, design secure AI systems, reduce related risks, and work with developers to enhance software security.
Take the first step toward your dream career with ITPU
Curriculum
1st year
  • Introduction to Digital Technologies
  • Introduction to Programming (Python)
  • Introduction to Software Testing
  • AI: Foundations and Applications for Software Engineers
  • Python
  • Introduction to Cybersecurity
  • Introduction to Cryptography
  • Discrete Mathematics
  • Further Math Essentials
  • Introduction to Studies
  • English Language
  • History
  • Religious Studies
  • Philosophy
Internship: Getting Acquainted with IT Professions
Core professional courses:
2nd year
  • Fundamentals of Programming (Java)
  • Fundamentals of Web Development
  • Computer Networks
  • Databases
  • Introduction to Cloud Computing
  • Operating Systems and System Software
  • Security Policy and Governance
  • Algorithms and Data Structures
  • Probability Theory and Basics Statistics
  • Business Communication
  • English Language
  • Intellectual Property and IT Law
  • Startup from Scratch
  • Psychology
Elective courses:
Core professional courses:
3rd year
  • Basics of DevOps
  • Cloud-Driven Software Development
  • Introduction to Machine Learning
  • Deep Learning and Generative AI Applications
  • Secure programming
  • Advanced Network Security
  • Agility and Decision Making
  • Work in Team
  • Business Analysis Basics
  • System Analysis and Design
  • Advanced Databases
  • Project Management
  • Advanced Software Testing
  • Behavioral Cybersecurity
Elective courses:
Core professional courses:
4th year
  • Cloud Security I
  • Information Assurance and Risk Management
  • Economics and Anti-Bribery
  • Responsible AI and Computer Ethics
  • Software Architecture Foundation
  • Security Testing
  • Security Operations: Operating Systems Security, Security Operations, AI Security
  • Cloud Security and DevSecOps: Security Operations, Secure Software Development, Cloud Security
  • AI Application Security: Operating Systems Security, Secure Software Development, AI Security
Specialization Subjects:
Specialization Course Project
Final Specialization Project
Final Examination
Core professional courses:
Employment opportunities
01
Information Security Risk Management Consultant
01
Information Security Risk Management Consultant
Upon completing this program, you can work in the following fields:
Analyzes vulnerabilities in IT infrastructure, assesses potential threats, and develops protection strategies. This specialist helps organizations implement security measures, comply with regulatory requirements, and minimize cyberattack risks, while also training personnel in information security fundamentals.
02
Information Security Engineer
02
Information Security Engineer
Protects IT infrastructure from cyber threats by developing and implementing security measures, configuring attack detection systems, and managing access control. This specialist conducts vulnerability audits, analyzes security incidents, and ensures compliance with information security standards.
03
Cybersecurity Specialist
03
Cybersecurity Specialist
Responsible for protecting data, networks, and IT infrastructure from cyberattacks. This specialist identifies vulnerabilities, develops and implements security measures, monitors threats, and responds to incidents. Additionally, they conduct system audits and train employees in cybersecurity best practices.
Cloud Security Specialist
04
Cloud Security Specialist
Protects cloud infrastructure, data, and services from cyber threats. This specialist develops and implements security measures, manages access control, ensures compliance with regulatory requirements, and analyzes vulnerabilities. They also configure monitoring tools and respond to incidents, ensuring the reliability of cloud solutions.
05
DevSecOps Engineer
05
DevSecOps Engineer
Integrates security practices at all stages of software development. This specialist automates security processes, configures secure CI/CD pipelines, analyzes code vulnerabilities, and manages access control. They ensure compliance with cybersecurity standards and collaborate with developers and operations teams to create robust and secure IT systems.
06
AI Application Security Developer
06
AI Application Security Developer
Develops and implements security measures for applications utilizing artificial intelligence. This specialist analyzes vulnerabilities in machine learning models, integrates cybersecurity mechanisms, prevents attacks on AI systems, and ensures their reliability. Additionally, they design secure data processing algorithms and ensure compliance with security standards.
Curriculum and Academic Calendar
Program Curriculum
Document:
Academic Calendar for the 2025/2026 Academic Year
Document:
Need consultation?
If you have any questions or need more information, please fill out the form below, and we will contact you shortly!