About the training program
Theory and methodology of ensuring information security and information protection. Methods, hardware and software tools, and organizational measures for protecting systems (objects) forming and providing users with various types of information resources. Methods, models, and means of detecting, identifying, classifying, and analyzing threats to information security of objects of various types and classes. Document management systems (regardless of their degree of computerization) and means of protecting the information circulating in them. Methods, models, and means (complexes of means) for countering threats to information security in open computer networks, including the Internet









