
Information and Cybersecurity Management
A comprehensive academic program dedicated to building infrastructure and a step-by-step cybersecurity strategy for your company.
Information and Cybersecurity Management
Program Overview
The micro-masters program provides practical knowledge for building a strategy and infrastructure to protect companies in cyberspace. Over 14 weeks, we will progress from understanding fundamental cyber threats to implementing strategic-level defense scenarios. You will learn to analyze and forecast risks for the markets of Ukraine, the USA, and Europe.
During the course, you will work on your own project – developing a step-by-step cybersecurity strategy for your company or based on a real case study. With the opportunity for continuous communication and feedback from instructors and mentors, you will be able to apply the acquired knowledge in practice and complete the program with a ready-to-implement strategy for your company.
What you will learn






Program Units
Module 1. Fundamentals of Cyber Security
Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.
- Topics Include
- Submodule 1 — Computing Security Concepts and Problems
- Submodule 2 — Cryptography and PKI, trusted services
- Submodule 3 — Networking and communication
- Submodule 4 — Systems Hardening
- Submodule 5 — BCP, IRP, DRP
Module 2. Global Project Management and Leadership
Global project management framework requests from leaders, the trifecta of skillsets: leadership, strategic business management, and technical project management.
- Topics Include
- Submodule 1 — Technical Project management
- Submodule 2 — Cybersecurity Leadership Essentials
- Submodule 3 — Business management
Module 3. Cybersecurity Risk Management
Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.
- Topics Include
- Submodule 1 — Introduction to cybersecurity risk management
- Submodule 2 — Cybersecurity Risk Management Process
- Submodule 3 — Standards and Frameworks for Cyber Risk Management Approach
Module 4. Supply Chain Security Management
Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics, and transportation. The learning objective of the module is to provide knowledge and skills for identifying, analyzing, and mitigating the risks inherent in working with other organizations as part of a supply chain.
- Topics Include
- Submodule 1 — Supply chain and third party services
- Submodule 2 — Threats and supply chain security
- Submodule 3 — Best practices & frameworks
Module 5. Security Governance, Ethics, and the Legal Environment
The module aims to provide data, insights, and recommendations on non-technical aspects of cybersecurity. It helps to address ethical and legal challenges in securing the digital infrastructure.
- Topics Include
- Submodule 1 — International and local legislation in cybersecurity
- Submodule 2 — Cybersecurity Governance
- Submodule 3 — Ethics, privacy and human rights in cybersecurity
MENTORS AND TUTORS


Oleksii Baranovskyi

Nick Gicinto
Former American CIA Officer, ex-Tesla, ex-Uber.
Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.


Owen O’Connor
Owen O’Connor is a cybersecurity leader with 25 years experience spanning technology, financial services, biotech, and consulting.
He currently serves as a managing director in the global cybersecurity team at State Street, a leading global financial services firm. Prior roles included Salesforce, where he built and led teams in incident response, forensics, and cloud security, and founding a cybersecurity startup dealing with online content as forensic evidence.


Irina Shymko
MA in Management and Business Intelligence. Over 15 years of experience in managing IT & software programs, 10 + years in business development. CEO at Langate Software. Also, Irina delivers the course “Technical Project Management” in Masters’ Programs at SET University.
Benefits

The opportunity to develop a step-by-step cybersecurity strategy for your company with the support of instructors and mentors.

Instructors are expert practitioners from Ukraine, the USA, and Europe, with experience at the CIA, Salesforce, Tesla, Uber, Sigma Software, and Octava Defence.

Study in a group of like-minded individuals facing similar challenges, including technical team leaders, DevOps professionals, and company founders.

Adaptive online learning — can be combined even with full-time job
Feedback from first-year students

Tamara Berestyana
I enjoyed the interactive workshops and meetings with experts because the topics covered in the sessions—AI, the spread of 5G, and online security—are highly relevant today. Additionally, the training was conducted in English, which provided extra language practice. It’s an opportunity to gain unique insights and experience from experts with real expertise. I appreciated the interaction with the instructors in the program; the communication was easygoing, and you were treated as an equal. You could openly discuss your interests, get the information you needed, and always receive feedback.

Oleh Khavrukh
I enjoyed the interactive workshops and meetings with experts because the topics covered in the sessions—AI, the expansion of 5G, and online security—are highly relevant today. Additionally, the training is conducted in English, which provided extra language practice. It’s an opportunity to gain unique insights and experience from experts with real industry knowledge.
I also appreciated the interaction with the instructors in the program—it was easygoing, and they treated you as an equal. You could have open conversations, ask questions about what interests you, and always receive feedback.

Mykola Platov
The “Information and Cybersecurity Management” micro-master’s program at SET University demonstrated a high level of educational quality, a well-structured curriculum, and excellent organization and preparation.
The practical experience of the instructors was a valuable addition to the theoretical knowledge. Each instructor had their unique approach and frequently used real cases from their professional work.
My main goal was to expand my knowledge from a technical level to a more strategic one. I was interested in understanding corporate security, its processes, methodologies, practices, and frameworks. All of these aspects were fully covered by the program.
A special thanks to the management team, Anna and Bohdan, for their professional support throughout the entire learning process.
Yulia Demchenko
Even before starting my micro master’s program, I researched the implementation of SOC and CERT in the State Border Guard Service, using Poland as an example. This research allowed me to understand the basic concepts in the field: how cyber threat response centres are created, the basic algorithms for responding to risks, etc. But I lacked the opportunity to communicate with IT professionals and practical training. The micro master’s program at SET University solved my problem.
The webinars, in addition to theoretical knowledge that could be consolidated on the platform, provided practical skills from industry experts. I am still sorting out the knowledge I have gained, as the amount of information on the program is very large.
Now, thanks to the program, I am finalizing a document with recommendations for creating a cyber threat response center at the State Border Guard Service. We are deepening our cooperation with the EU and need to implement their security standards in law enforcement.
For whom

DevOps and DevSecOps specialists

Middle+ developers

Technical team leads

InfoSec specialists

System administrators

C-level management and other employees involved in the company’s security strategy
Frequently Asked Questions
Who is eligible to apply for the MicroMasters program?
The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of two years of work experience in a technical environment.
Note: coding experience ISN’T NECESSARY for this program.

Is it necessary to have coding skills to study at this program?
No, programming skills are not required for this program.

What is a MicroMaster's program?
A MicroMaster’s program is a mid-term program (micro-credentials program) that includes several modules from the main master’s program. In addition, graduates receive ECTS credits for completing these modules, which can be used to transfer to a master’s program later.

What format will the classes be held in?
The program consists of online lectures and hands-on webinars with the subject matter expert. Within each module, students also undergo progressive testing, and at the end of the program, they present a final project demonstrating the acquired skills.

Can ECTS credits earned through this MicroMasters program be considered towards a Master's program in Cybersecurity?
Yes, learners who complete all six educational modules successfully (with 80%+ acceptance rate) and are accepted into the Master’s program may transfer credits.

Does the MicroMasters Certificate guarantee a job interview after completing the program?
Obtaining a MicroMasters Program certificate will give you the tools to stand out in the industry. But the certificate itself does not guarantee a job interview or a job. However, you can share your certificate on your LinkedIn page and resume to demonstrate your achievements and highlight the knowledge acquired.

Is there an opportunity to receive a scholarship?
Yes, the Information and Cybersecurity Management program offers scholarship spots for members of the Armed Forces of Ukraine and veterans, civil servants, and women who want to develop their careers in IT.
Partners



Learn more about the SET University program
