UA

Information and Cybersecurity Management

A comprehensive academic program dedicated to building infrastructure and a step-by-step cybersecurity strategy for your company.

Learn more about program

Information and Cybersecurity Management

Program Start: October 15
Duration: 14 weeks
Language: Eng/Ukr
Format: online
ECTS: 12
Price: 12 500₴/month (indicated with a discount)
Discount: -20% for the first 10 places

Program Overview

The micro-masters program provides practical knowledge for building a strategy and infrastructure to protect companies in cyberspace. Over 14 weeks, we will progress from understanding fundamental cyber threats to implementing strategic-level defense scenarios. You will learn to analyze and forecast risks for the markets of Ukraine, the USA, and Europe.

During the course, you will work on your own project – developing a step-by-step cybersecurity strategy for your company or based on a real case study. With the opportunity for continuous communication and feedback from instructors and mentors, you will be able to apply the acquired knowledge in practice and complete the program with a ready-to-implement strategy for your company.

What you will learn

Develop informational security systems following international standards: GDPR, PCI DSS, and Privacy Shield
Integration of the latest cybersecurity programs and technologies for effectively managing interaction with privacy information
Understanding cybersecurity requirements necessary for business development and secure interaction with contractors and external partners
Application of modern Business Continuity Planning and Incident Response practices to prevent potential cyberattacks
Risk analysis of potential cyber threats as a critical component of business strategy in Ukraine
Principles of deploying and strengthening information infrastructure considering risks in the cyber environment

Program Units

Module 1. Fundamentals of Cyber Security

6–10 hours per week for 2 weeks

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.

  • Topics Include
  • Submodule 1 — Computing Security Concepts and Problems
  • Submodule 2 — Cryptography and PKI, trusted services
  • Submodule 3 — Networking and communication
  • Submodule 4 — Systems Hardening
  • Submodule 5 — BCP, IRP, DRP

Module 2. Global project management

6–10 hours per week for 2 weeks

Global project management framework requests from leaders, the trifecta of skillsets: leadership, strategic business management, and technical project management.

  • Topics Include
  • Submodule 1 — Technical Project management
  • Submodule 2 — Cybersecurity Leadership Essentials
  • Submodule 3 — Business management

Module 3. Cybersecurity Risk Management

6–10 hours per week for 2 weeks

Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.

  • Topics Include
  • Submodule 1 — Introduction to cybersecurity risk management
  • Submodule 2 — Cybersecurity Risk Management Process
  • Submodule 3 — Standards and Frameworks for Cyber Risk Management Approach

Module 4. Supply chain security management

6–10 hours per week for 2 weeks

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics, and transportation. The learning objective of the module is to provide knowledge and skills for identifying, analyzing, and mitigating the risks inherent in working with other organizations as part of a supply chain.

  • Topics Include
  • Submodule 1 — Supply chain and third party services
  • Submodule 2 — Threats and supply chain security
  • Submodule 3 — Best practices & frameworks

Module 5. Security Governance, Ethics, and the Legal Environment

6–10 hours per week for 2 weeks

The module aims to provide data, insights, and recommendations on non-technical aspects of cybersecurity. It helps to address ethical and legal challenges in securing the digital infrastructure.

  • Topics Include
  • Submodule 1 — International and local legislation in cybersecurity
  • Submodule 2 — Cybersecurity Governance
  • Submodule 3 — Ethics, privacy and human rights in cybersecurity

Module 6. Capstone Written Project

6–10 hours per week for 2 weeks

MicroMasters program capstone experience for verified learners entails practical demonstration of these skills.

MENTORS AND TUTORS

Oleksii Baranovskyi

President of ISACA Kyiv Chapter — Information Systems Audit and Control Association. Expert with 15+ years of experience in the field of information and cybersecurity. Worked as a Security Analyst, CISO.
Ph.D. in Information Technology, Associate Professor at NTUU Kyiv Polytechnic Institute, Senior Lecturer at Blekinge Institute of Technology in Sweden.

Nick Gicinto

Former American CIA Officer, ex-Tesla, ex-Uber.

Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.

Benefits

The opportunity to develop a step-by-step cybersecurity strategy for your company with the support of instructors and mentors.

Instructors are expert practitioners from Ukraine, the USA, and Europe, with experience at the CIA, Salesforce, Tesla, Uber, Sigma Software, and Octava Defence.

Study in a group of like-minded individuals facing similar challenges, including technical team leaders, DevOps professionals, and company founders.

Adaptive online learning — can be combined even with full-time job

Feedback from first-year students

Tamara Berestyana

PR Manager at Huawei Ukraine

What did you like most about the program?
The interactive workshops and expert meetings were especially enjoyable because the topics covered during the sessions—AI, 5G expansion, and online security—are highly relevant today. Additionally, the fact that the training was conducted in English provided extra practice. It was an opportunity to gain unique information and experience from experts with real expertise.

 

Did you like the program’s instructors?
Yes! The communication was easy, and they treated you as an equal. You could openly ask questions and always received feedback.

 

What advice would you give to future SET University students?
Study at SET University!

 

Are you applying the knowledge you gained in the program to your work? Perhaps there are already some results that show how the training has impacted your professional activities?
The knowledge I’ve gained from the program is very helpful in managing projects and communicating with partners in my professional work. In my academic work, I published an article (based on the course’s final project) and continue to research this topic in my PhD studies.

Oleh Khavrukh

IT Director at "Nash Format" Publishing House and Head of an Internet Agency

What did you like about the program?
The program is intense and interesting.

 

What was the main insight you gained from the training?
I relearned how to learn. After a 25-year break since finishing university, I realized that the approach to teaching and presenting material is different now, and it’s important to acknowledge and accept this.

 

Did your expectations match the reality?
Overall, yes.

 

What advice would you give to the next cohort of students in this program?
You should understand that this is a micro-master’s program specifically in Information Security Management, not SecOps or hacker courses. Therefore, this course is primarily aimed at those who want to grow in the field of cybersecurity and focus on managing processes and personnel.

 

Are you applying the knowledge you gained in the program to your work? Perhaps there are already some results that show how the training has impacted your professional activities?
I am actively applying the knowledge I’ve gained in my work to provide services to clients. At the moment, I am planning to launch a new service line for improving cybersecurity measures, involving colleagues I met during the Cyberdefender workshop for veterans. The training gave me a clear perspective on the cybersecurity field and an opportunity to acquire additional knowledge in this area.

For whom

DevOps and DevSecOps specialists

Middle+ developers

Technical team leads

InfoSec specialists

System administrators

C-level management and other employees involved in the company’s security strategy

Frequently Asked Questions

Who is eligible to apply for the MicroMasters program?

The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of two years of work experience in a technical environment.

Note: coding experience ISN’T NECESSARY for this program.

Is it necessary to have coding skills to study at this program?

No, programming skills are not required for this program.

What is a MicroMaster's program?

A MicroMaster’s program is a mid-term program (micro-credentials program) that includes several modules from the main master’s program. In addition, graduates receive ECTS credits for completing these modules, which can be used to transfer to a master’s program later.

What format will the classes be held in?

The program consists of online lectures and hands-on webinars with the subject matter expert. Within each module, students also undergo progressive testing, and at the end of the program, they present a final project demonstrating the acquired skills.

Can ECTS credits earned through this MicroMasters program be considered towards a Master's program in Cybersecurity?

Yes, learners who complete all six educational modules successfully (with 80%+ acceptance rate) and are accepted into the Master’s program may transfer credits.

Does the MicroMasters Certificate guarantee a job interview after completing the program?

Obtaining a MicroMasters Program certificate will give you the tools to stand out in the industry. But the certificate itself does not guarantee a job interview or a job. However, you can share your certificate on your LinkedIn page and resume to demonstrate your achievements and highlight the knowledge acquired.

Is there an opportunity to receive a scholarship?

Yes, the Information and Cybersecurity Management program offers scholarship spots for members of the Armed Forces of Ukraine and veterans, civil servants, and women who want to develop their careers in IT.

Partners

Learn more about the SET University program

Thank you! We will contact you shortly.

Questions left?

Get a consultation: hello@setuniversity.tech

You migt be interested in:

1.5 years -35% 58 500 uah/semester

122. Cyber Defense

October 2024
1.5 years -35% 58 500 uah/semester

122. Computer Science: Innovation Engineering

October 2024
3 days Free, based on the selection of applications

AI and Business Analytics Training for Women

August, 30
We use cookies to improve your experience.