Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Information security systems and automation of information processing

8.125.02 Information security systems and automation of information processing
Qualification awarded : Master in Information security systems and automation of information processing
Entry year: 2017
Program duration: 2 years
Number of credits: 120 ECTS credits
Level of qualification according to the National Qualification Framework and the European Qualifications Framework: Second (Master) level, 8-th level of NQF, EHEA second Cycle
Field(s) of study: Information technology
Specific admission requirements:
Specific arrangements for recognition of prior learning:
Qualification requirements and regulations, including graduation requirements:
Characteristics of the educational program:
Gained competence:
- knowledge of general scientific analysis methods in the sphere of information security;
- knowledge of typical approaches to protected information activity objects design;
- knowledge of legal and scientific-organizational basics for performing licensing, approval and certification of computer security objects;
- ability of planning and performing own scientific investigation dedicated to the significant problem in modern science in the branch of restricted data protection;
- knowledge of facts, their understanding and investigation results interpretation in the forms of reports, publications in the state language or in one of foreign languages.
- be able and ready to use the knowledge of scientific investigation forms and methods in the information security branch;
- based on the knowledge of scientific methodology, to organize investigating process in the branch of information security and protection information;
- ability to provide justification for and implement the system of information security resources with restricted data protection at the information activity objects;
- be able to certify (based on accounting and investigating) regime territories (zones), premises etc. under the conditions of information security procedures with recording results at the appropriate documents.
- be able to process outcomes, analyse and make sense of them taking published materials into account;
- make an assessment of conformity of the information security system of computerized system with its purpose according to the requirements of operating standards;
- be able to estimate the real threats of protection and security violation.
Mode of study: part
Academic mobility:
Work placement(s):
Programme director:
Occupational profiles of graduates:
Access to further studies:
Other program features:
Institute: Institute of Computer Technologies, Automation and Metrology