About the training program
Analysis of known and newly identified vulnerabilities, their systematization, development of methods for intelligent search for new classes of vulnerabilities. Modeling of information security policies, threats, and attacks, methodological foundations for developing protection profiles. Methods of designing, modeling, analyzing, and transforming programs to identify potential vulnerabilities in software systems, taking into account the specifics of the life cycle phases: requirements development, architecture design, code development, testing, verification, certification, and operation. Methods, algorithms, and tools for post-release in-depth analysis of software and hardware security.









