Game Development Engineering (Ms & PhD.)

Cybersecurity Engineering involves creating and managing hardware, software, and security policies for the protection of systems, networks, and data. Cyber engineers incorporate electrical engineering and computer science to understand cyberspace.

OVERVIEW

Identifies information security threats and data loss risks, develops and implements threat countermeasures and solutions to protect against information loss; ensures the safety and confidentiality of data; participates in the development and implementation of IT solutions

Mobile phones, computers, cars, and for some time even household appliances bind themselves and their owner with a huge amount of data. Information systems in business, trade and finance have reached gigantic proportions, as evidenced by the current cryptocurrency boom.

All this has led to the formation of new values that are created or transmitted in cyberspace. Along with this, there was also a threat of theft of these valuables, their damage or substitution. To counter attackers, cybersecurity experts are needed who can protect information, predict the actions of criminals and create a secure architecture for using data.

Cybersecurity specialists work in large financial and IT companies, the value of such personnel is noted in government agencies, defense departments, where their main task is to ensure national security and prevent penetration into state infrastructure.

One day in class, your professor might show a social media post from a politician or celebrity. You and your classmates analyze, critique, and discuss that post from different angles, such as its medium, its message, its meanings both expressed and implied, the credibility of the messenger, and the cultural impact of the message. Then you write your own social-media post in response.

What tasks will the specialist solve?

  • combating cybercrime in all its manifestations, including cyberterrorism and ­extortion
  • development of preventive methods to combat malware, protection of private information and intellectual property
  • ensuring the stability of the operation of ­socially important information systems, preventing situations of collapse of the banking system
  • protection and prevention of external interference in infrastructure, including power grids
  • search for potential vulnerabilities in existing systems, their elimination

How much do such specialists earn and how much they are in demand

A full-fledged information security specialist with 1-2 years of experience – 100-150 thousand.

A specialist with 3-5 years of experience – 150-200 thousand.

Programme

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

FORM

Are you ready to take the next step toward your future career?