PhD program
Information Security Systems

Information Security Systems

QUALIFICATION

  • Scientific and pedagogical direction - Doctor of Philosophy (PhD)

MODEL OF GRADUATING STUDENT

Upon completion of this program, PhD graduates are expected to be able to:
1.demonstrate a systematic understanding of information security techniques and tools;
2.justify the choice of decision-making methodology to ensure the protection of information;
3. demonstrate knowledge of patent search procedures, protection of intellectual property rights to scientific discoveries and developments;
4. analyze and evaluate, improve processes, develop specifications and design information security systems;
5. classify methods for ensuring and assessing security in information processing systems (operating systems and applications, networks, protocols);
6. to analyze the existing methods and means used for the control and protection of information, and to develop a proposal for their improvement and increase the effectiveness of this protection;
7. identify similarities and differences in methods and systems of protection, security assessment and measures taken to protect information, methodology for creating secure information systems;
8. develop software for innovative projects using the latest technological solutions;
9. evaluate the cryptographic strength of block ciphers, the synthesis of ciphers, encryption systems with public keys, key distribution protocols, identification, organization of confidential communication networks;
10. analyze, evaluate and synthesize new and complex ideas in the field of information security; formulate innovative scientific tasks in the field of design and development of information security systems;
11. to prepare on the basis of the results of the research publications that deserve coverage at the national and international levels, scientific and technical reports, reviews;
12. to substantiate the obtained scientific results in the field of information security in front of the wider scientific community, convincing opponents and observing the scientific ethics of the researcher.

Program passport

Speciality Name
Information Security Systems
Speciality Code
8D06301
Faculty
Information technology

disciplines

Academic writing
  • Number of credits - 2
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - This course aims to enhance students' understanding of research work structure, forms, and content, and to develop essential skills for writing and analyzing scientific texts. Focusing on "Information Security Systems," it helps students avoid common errors in creating technical descriptions and scientific documents relevant to their field

Evaluation of Cryptographic Algorithms Strength
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to provide doctoral students with advanced knowledge on the durability of cryptographic algorithms. Upon completion, students will master modern methods for assessing cryptographic strength and ensuring data confidentiality, integrity, and authentication.

Models and methods of information security assessment
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course reviews management and organizational control processes essential for data protection, focusing on national and industry compliance requirements. It analyzes the depth and breadth of compliance management studies and explores various approaches to data protection control.

Scientific Research methods
  • Number of credits - 3
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to enhance doctoral students' skills in scientific cognition methodology. It covers the use of information technology and mathematical tools for creating and processing information systems, and applies knowledge of current information security challenges and subject specifics to solve professional and educational tasks.

Data for 2023-2026 years

disciplines

Analysis of Cryptocurrency technologies security
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to study the basics of cryptocurrency technologies and analyze the security of bitcoin-like systems. The following will be studied: - the mathematical foundations of blockchain technologies; - the structure and technology of cryptocurrency transactions; - Security analysis of Bitcoin and darkcoin-like systems.

Cryptanalysis
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to develop competencies in using and analyzing cryptographic algorithms, focusing on core principles and methods. Expected outcomes include mastering and organizing key concepts related to algorithm security and comparing theoretical and practical aspects of cryptographic algorithm usage.

Cryptographic Generators of Pseudo-Random Sequences, the Assessment of Their Quality
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to impart knowledge on fundamental cryptographic information protection principles and practical implementation. Doctoral students will understand key trends and future directions in information protection methods, including message authenticity, secure information storage, and embedding hidden official information.

Cryptographic Key Management Systems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - Purpose of discipline is to present principles of construction and mathematical justification of key management. As a result of studying the discipline, student will be able to: know theoretical and applied aspects of key creation mechanism using symmetric cryptographic methods; master the principles of building conceptual models of key distribution.

Cryptographic Techniques Based on Modular Arithmetic
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The discipline aims to explore cryptography's mathematical foundations, focusing on NPSS-based cryptographic systems and their software models. Doctoral students will gain knowledge of modular arithmetic concepts, abstract algebra, and finite group theorems, essential for understanding and developing cryptographic information protection systems.

Development of information security tools
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to spark students' interest in information security issues and acquaint them with the organizational aspects of information security systems. Doctoral students will learn to apply information law, and understand certification, standardization, and accreditation principles in the information sector.

Machine Learning Algotithms for Information Assurance
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The discipline aims to equip students with professional knowledge and skills in creating machine learning systems and researching data mining methods for information security. Graduates will understand data processing fundamentals, machine learning algorithms, and the design of machine learning systems.

Programming of security systems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to form the ability to provide software security measures for computer systems for various purposes. As a result of studying the discipline, the doctoral student will be able to know the basic provisions, concepts and categories related to software security.

Testing safety systems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - Purpose of the discipline is to test various programmed security systems. As a result of studying the discipline, doctoral student will be able to: - know the basic tasks and concepts of cryptography; - use requirements for ciphers and main characteristics of ciphers; - study encryption standards, models and methods.

Theory, methods and tools of cryptography
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course aims to develop students' professional competencies in understanding modern information security issues and cryptographic protection methods. Doctoral students will learn to describe cryptographic algorithms and protocols, and critically evaluate researchers' work based on strict principles.

Data for 2023-2026 years

INTERNSHIPS

Pedagogical
  • Type of control - Защита практики
  • Description - Formation of practical, educational-methodical skills of conducting lectures, seminars, creatively apply scientific, theoretical knowledge, practical skills in teaching activities, conduct training sessions in the disciplines of the specialty; own modern professional techniques, methods of training, use in practice the latest theoretical, methodological advances, make educational, methodological documentation.

Research
  • Type of control - Защита практики
  • Description - The purpose of the practice: gaining experience in the study of an actual scientific problem, expand the professional knowledge gained in the learning process, and developing practical skills for conducting independent scientific work. The practice is aimed at developing the skills of research, analysis and application of economic knowledge.

Data for 2023-2026 years