Information Security
Master's program
Duration:
Format:
Language:
Tuition fee:
1.5 academic years
Online
English
22 500 000 UZS per semester
About the program
The Information Security master's program is designed to prepare specialists with deep knowledge and expertise in cybersecurity. Students will master cutting-edge security practices, enabling them to effectively and innovatively address complex challenges across various industries.
Learning tracks
Within the Information Security master's program, students can choose one of three key learning tracks: Cybersecurity Architecture, Cybersecurity Management, Cybersecurity Consulting, each tailored to specific cybersecurity demands.
01
02
Cybersecurity Architecture
Cybersecurity Management
Focuses on designing secure network and information environments. This specialization teaches students to develop detailed security strategies that align with business objectives and regulatory requirements.
Centers on managing security policies, programs, and practices. Students will learn to oversee cybersecurity operations and adapt to the ever-changing threat landscape.
03
Cybersecurity Consulting
Prepares students to advise businesses on data protection and compliance. This track covers risk assessment, vulnerability detection, and the development of strategies for mitigating security threats.
Take the first step toward your dream career with ITPU
Program objectives
  • Prepare specialists capable of developing and implementing advanced cybersecurity practices.

  • Teach students to solve complex professional challenges, respond to modern threats, and demonstrate creativity and leadership.

  • Develop in-depth research skills in cybersecurity, both individually and in teams.
Curriculum
Semester 1
Information Security
AI for Cybersecurity
Cloud Security Foundations
Advanced Network Security
Information Assurance and Risk Management
Leadership and Management Foundations for Software Engineering
  • Security Software Development
  • Security Operations
  • Cybersecurity Program Management
  • Security Assessment and Auditing
Elective courses:
Semester 2
Generative AI
Methodology of Scientific research in Computer Sciences and Academic Writing
International Research project
Effective Client Communication and Presentation Strategies
  • Advanced Cloud Security
  • Security Architecture and Design
  • Enterprise Security Architecture Organizational Behaviour & Change Management in Security
  • Compliance and Regulatory Frameworks
  • Industry-Specific Security Consulting
Elective courses:
Semester 3
Final project
Faculty
Svyatoslav Kulikov
Senior Manager,
EPAM
Andrei Starovoitau
Senior Front-End Developer, EPAM
Tatiana Slednikova
Senior Software Engineer, EPAM
Abdulmalik Mamirov
Senior Java Developer, EPAM
Anton Isaiev
Systems Architect, EPAM
Viktoria Mironova
Team Leader,
EPAM
Pavel
Bui
Senior Java Developer, EPAM
Vadim Markov
Senior Java Developer, EPAM
100% of instructors are active professionals from EPAM, a leading international IT company. They bring real-world experience and insights into market demands, teaching students the most in-demand technologies.
Employment opportunities
01
Cybersecurity Architect
01
Cybersecurity Architect
Upon completing this program, you can work in the following fields:
Develops and implements strategic solutions to protect IT infrastructure. This specialist designs secure systems, defines the architecture of security measures, analyzes vulnerabilities, and assesses risks. They create security policies, ensure compliance with standards, and coordinate cybersecurity teams.
02
Security Consultant
02
Security Consultant
Evaluates risks and vulnerabilities of IT infrastructure, develops data protection strategies, and helps companies comply with information security standards. They analyze threats, implement security measures, conduct security audits, and educate employees on cyber hygiene.
03
Risk Adviser
03
Risk Adviser
Analyzes potential threats and develops risk management strategies for businesses. They assess financial, operational, and cyber risks, propose solutions for risk mitigation, ensure compliance with regulatory requirements, and advise leadership on strategic security and business resilience matters.
04
Cybersecurity Project Manager
04
Cybersecurity Project Manager
Leads the implementation of IT infrastructure security solutions. They coordinate team efforts, plan resources, oversee task execution, and ensure project compliance with security requirements. The specialist manages risks, interacts with clients, and ensures the seamless integration of security measures into business processes.
05
Cybersecurity Manager
05
Cybersecurity Manager
Develops and implements the company's information security strategy. They manage risks, ensure compliance with security requirements, coordinate cybersecurity specialists, and communicate with senior management. Additionally, they are responsible for regulatory compliance and incident response.
Curriculum and Academic Calendar
Program Curriculum
Document:
Academic Calendar
Document:
Ready to make a step towards your new career in IT?
To apply for one of our programs, please fill out the registration form: