Information Security
Master's program
Duration:
Format:
Language:
Tuition fee:
1.5 academic years
Online
English
22 500 000 UZS per semester
About the program
The Information Security Master's Degree program is designed to prepare specialists with deep knowledge and expertise in cybersecurity. Students will master cutting-edge security practices, enabling them to effectively and innovatively address complex challenges across various industries.
Specializations
Within the Information Security master's program, students can choose one of three specializations: Cybersecurity Architecture, Cybersecurity Management, Cybersecurity Consulting, each tailored to specific cybersecurity demands.
01
02
Cybersecurity Architecture
Cybersecurity Management
Focuses on designing the security architecture of information systems and applications. This specialization teaches students to develop detailed security strategies that align with business objectives and regulatory requirements.
Focused on developing skills in managing information security within an organization. Students will learn how to design security strategies and programs, and adapt them to the rapidly evolving cybersecurity threat landscape.
03
Cybersecurity Consulting
Prepares you for the role of an information security consultant. You will learn to assess risks and threats and develop strategies to effectively mitigate them across various industries.
Take the first step toward your dream career with ITPU
Program objectives
  • Prepare specialists capable of developing and implementing advanced cybersecurity practices.

  • Teach students to solve complex professional challenges, respond to modern threats, and demonstrate creativity and leadership.

  • Develop research skills in cybersecurity, both individually and in teams.
Curriculum
Semester 1
  • Foundations of information security
  • AI for Cybersecurity
  • Cloud security basics
  • Advanced Network Security
  • Information Assurance and Risk Management
  • Digital forensics
  • Leadership and management for information security professionals
  • Security Software Development
  • Security Operations
  • Cybersecurity Program Management
  • Security Assessment and Auditing
Elective courses:
Core professional courses:
Semester 2
  • Generative AI for cybersecurity
  • Methodology of Scientific research in Computer Sciences and Academic Writing
  • International Research project
  • Effective Client Communication and Presentation Strategies
  • Advanced Cloud Security
  • Security Architecture and Design
  • Enterprise Security Architecture Organizational Behaviour & Change Management in Security
  • Compliance and Regulatory Frameworks
  • Industry-Specific Security Consulting
Elective courses:
Core professional courses:
Semester 3
  • Internship
  • Final project
Employment opportunities
01
Cybersecurity Architect
01
Cybersecurity Architect
Upon completing this program, you can work in the following fields:
Develops and implements strategic solutions to protect IT infrastructure. This specialist designs secure systems, defines the architecture of security measures, analyzes vulnerabilities, and assesses risks. They create security policies, ensure compliance with standards, and coordinate cybersecurity teams.
02
Security Consultant
02
Security Consultant
Evaluates risks and vulnerabilities of IT infrastructure, develops data protection strategies, and helps companies comply with information security standards. They analyze threats, implement security measures, conduct security audits, and educate employees on cyber hygiene.
03
Cybersecurity Manager
03
Cybersecurity Manager
Builds and deploys the company's information security strategy. They manage risks, ensure compliance with security requirements, coordinate cybersecurity specialists, and communicate with senior management. Additionally, they are responsible for regulatory compliance and incident response.
04
Chief Information Security Officer (CISO)
04
Chief Information Security Officer (CISO)
Leads the development and implementation of the organization’s information security strategy. Defines policies and controls to protect data, systems, and infrastructure from cyber threats. Oversees risk management, ensures regulatory compliance, coordinates the work of cybersecurity teams, and collaborates with company leadership. Also responsible for incident response and fostering a culture of cybersecurity awareness across the organization.
05
Information Security Auditor
05
Information Security Auditor
Evaluates an organization’s security policies, systems, and procedures to identify vulnerabilities and ensure compliance with industry standards. Conducts audits, assesses risks, and provides recommendations to strengthen cybersecurity measures. Verifies alignment with frameworks and prepares reports to help minimize the organization’s exposure to threats.
Curriculum and Academic Calendar
Program Curriculum
Document:
Academic Calendar
Document:
Ready to make a step towards your new career in IT?
To apply for one of our programs, please fill out the registration form: