The Information Security Master's Degree program is designed to prepare specialists with deep knowledge and expertise in cybersecurity. Students will master cutting-edge security practices, enabling them to effectively and innovatively address complex challenges across various industries.
Specializations
Within the Information Security master's program, students can choose one of three specializations: Cybersecurity Architecture, Cybersecurity Management, Cybersecurity Consulting, each tailored to specific cybersecurity demands.
01
02
Cybersecurity Architecture
Cybersecurity Management
Focuses on designing the security architecture of information systems and applications. This specialization teaches students to develop detailed security strategies that align with business objectives and regulatory requirements.
Focused on developing skills in managing information security within an organization. Students will learn how to design security strategies and programs, and adapt them to the rapidly evolving cybersecurity threat landscape.
03
Cybersecurity Consulting
Prepares you for the role of an information security consultant. You will learn to assess risks and threats and develop strategies to effectively mitigate them across various industries.
Take the first step toward your dream career with ITPU
Prepare specialists capable of developing and implementing advanced cybersecurity practices.
Teach students to solve complex professional challenges, respond to modern threats, and demonstrate creativity and leadership.
Develop research skills in cybersecurity, both individually and in teams.
Curriculum
Semester 1
Foundations of information security
AI for Cybersecurity
Cloud security basics
Advanced Network Security
Information Assurance and Risk Management
Digital forensics
Leadership and management for information security professionals
Security Software Development
Security Operations
Cybersecurity Program Management
Security Assessment and Auditing
Elective courses:
Core professional courses:
Semester 2
Generative AI for cybersecurity
Methodology of Scientific research in Computer Sciences and Academic Writing
International Research project
Effective Client Communication and Presentation Strategies
Advanced Cloud Security
Security Architecture and Design
Enterprise Security Architecture Organizational Behaviour & Change Management in Security
Compliance and Regulatory Frameworks
Industry-Specific Security Consulting
Elective courses:
Core professional courses:
Semester 3
Internship
Final project
Employment opportunities
01
Cybersecurity Architect
01
Cybersecurity Architect
Upon completing this program, you can work in the following fields:
Develops and implements strategic solutions to protect IT infrastructure. This specialist designs secure systems, defines the architecture of security measures, analyzes vulnerabilities, and assesses risks. They create security policies, ensure compliance with standards, and coordinate cybersecurity teams.
02
Security Consultant
02
Security Consultant
Evaluates risks and vulnerabilities of IT infrastructure, develops data protection strategies, and helps companies comply with information security standards. They analyze threats, implement security measures, conduct security audits, and educate employees on cyber hygiene.
03
Cybersecurity Manager
03
Cybersecurity Manager
Builds and deploys the company's information security strategy. They manage risks, ensure compliance with security requirements, coordinate cybersecurity specialists, and communicate with senior management. Additionally, they are responsible for regulatory compliance and incident response.
04
Chief Information Security Officer (CISO)
04
Chief Information Security Officer (CISO)
Leads the development and implementation of the organization’s information security strategy. Defines policies and controls to protect data, systems, and infrastructure from cyber threats. Oversees risk management, ensures regulatory compliance, coordinates the work of cybersecurity teams, and collaborates with company leadership. Also responsible for incident response and fostering a culture of cybersecurity awareness across the organization.
05
Information Security Auditor
05
Information Security Auditor
Evaluates an organization’s security policies, systems, and procedures to identify vulnerabilities and ensure compliance with industry standards. Conducts audits, assesses risks, and provides recommendations to strengthen cybersecurity measures. Verifies alignment with frameworks and prepares reports to help minimize the organization’s exposure to threats.