About the training program
Graduates of the program are able to:
-develop threat models and models of information security intruders of specific information technology objects;
-form requirements for ensuring information security of information technology objects;
-form a list of security functions of an information technology object and select rational methods and means for their implementation;
-develop design solutions for information security systems for information technology objects;
-conduct an analysis of systems in a secure design for their compliance with information security requirements.









