UA
Where Science, Entrepreneurship, and Technology Unite

Information and Cybersecurity Management

The comprehensive academic program dedicated to the management of cybersecurity of companies

Learn more about program

Information and Cybersecurity Management

Program Start: January 18
Duration: 14 weeks
Application deadline: January 18
Language: Eng/Ukr
Format: online
ECTS: 12
Price: 12 500₴/month (indicated with a discount)
Discount: -20% for the first 10 places

Program Overview

The Micromaster’s program is dedicated to the development and management of projects to protect companies in cyberspace. Over 9 weeks, we will cover all the fundamentals of cybersecurity: from basic cyberthreats to implementing security scenarios at a strategic level. We will learn to analyze and forecast risks and build a strategy for protecting the sensitive data of companies and users, considering markets of Ukraine, the USA and Europe.

 

The program will be most relevant for top management, team leads and heads of engineering and product teams. At the end of the program, participants will take a complex test and work on a course project.

What you will learn

Develop informational security systems following international standards: GDPR, PCI DSS, and Privacy Shield
Integration of the latest cybersecurity programs and technologies for effectively managing interaction with privacy information
Understanding cybersecurity requirements necessary for business development and secure interaction with contractors and external partners
Ethical and law aspects of informational security in product development
Application of modern Business Continuity Planning and Incident Response practices to prevent potential cyberattacks
Risk analysis of potential cyber threats as a critical component of business strategy in Ukraine

SET Grants — scholarships for Micromasters program

SET University has launched scholarships that cover 70% of the cost of studying for a Micromaster's program in cybersecurity. The scholarships are aimed at supporting women aspiring to develop in IT, military personnel, and combat veterans.

To participate, you need to
- prepare a motivation letter
- fill out the application form
- pass a technical test for basic competencies

Submission deadline: January 11

Apply to grant

Program Units

Module 1. Fundamentals of Cyber Security

6–10 hours per week for 2 weeks

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.

Topics Include
  • Submodule 1 — Computing Security Concepts and Problems
  • Submodule 2 — Cryptography and PKI, trusted services
  • Submodule 3 — Networking and communication
  • Submodule 4 — Systems Hardening
  • Submodule 5 — BCP, IRP, DRP

Module 2. Global project management

6–10 hours per week for 2 weeks

Global project management framework requests from leaders, the trifecta of skillsets: leadership, strategic business management, and technical project management.

Topics Include
  • Submodule 1 — Technical Project management
  • Submodule 2 — Cybersecurity Leadership Essentials
  • Submodule 3 — Business management

Module 3. Cybersecurity Risk Management

6–10 hours per week for 2 weeks

Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.

Topics Include
  • Submodule 1 — Introduction to cybersecurity risk management
  • Submodule 2 — Cybersecurity Risk Management Process
  • Submodule 3 — Standards and Frameworks for Cyber Risk Management Approach

Module 4. Supply chain security management

6–10 hours per week for 2 weeks

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics, and transportation. The learning objective of the module is to provide knowledge and skills for identifying, analyzing, and mitigating the risks inherent in working with other organizations as part of a supply chain.

Topics Include
  • Submodule 1 — Supply chain and third party services
  • Submodule 2 — Threats and supply chain security
  • Submodule 3 — Best practices & frameworks

Module 5. Security Governance, Ethics, and the Legal Environment

6–10 hours per week for 2 weeks

The module aims to provide data, insights, and recommendations on non-technical aspects of cybersecurity. It helps to address ethical and legal challenges in securing the digital infrastructure.

Topics Include
  • Submodule 1 — International and local legislation in cybersecurity
  • Submodule 2 — Cybersecurity Governance
  • Submodule 3 — Ethics, privacy and human rights in cybersecurity

Module 6. Capstone Written Project

6–10 hours per week for 2 weeks

MicroMasters program capstone experience for verified learners entails practical demonstration of these skills.

MENTORS AND TUTORS

Oleksii Baranovskyi

President of ISACA Kyiv Chapter — Information Systems Audit and Control Association. Expert with 15+ years of experience in the field of information and cybersecurity. Worked as a Security Analyst, CISO.
Ph.D. in Information Technology, Associate Professor at NTUU Kyiv Polytechnic Institute, Senior Lecturer at Blekinge Institute of Technology in Sweden.

Nick Gicinto

Former American CIA Officer, ex-Tesla, ex-Uber.

Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.

Benefits

The comprehensive practical program focused on working with real-world cases

Adaptive online learning — can be combined even with full-time job

Work in groups with constant feedback from lecturers

Feedback from first-year students

Yulia Demchenko

State Border Guard Service Officer

Even before starting my micro master’s program, I researched the implementation of SOC and CERT in the State Border Guard Service, using Poland as an example. This research allowed me to understand the basic concepts in the field: how cyber threat response centres are created, the basic algorithms for responding to risks, etc. But I lacked the opportunity to communicate with IT professionals and practical training. The micro master’s program at SET University solved my problem.

The webinars, in addition to theoretical knowledge that could be consolidated on the platform, provided practical skills from industry experts. I am still sorting out the knowledge I have gained, as the amount of information on the program is very large.

Now, thanks to the program, I am finalizing a document with recommendations for creating a cyber threat response center at the State Border Guard Service. We are deepening our cooperation with the EU and need to implement their security standards in law enforcement.

Dmytro Akhtyrsky

Chief information security officer

I am the director of the IT department at the State Agency of Water Resources of Ukraine. Before that I worked at Huawei as a business development manager, where I was responsible for data processing and everything related to their infrastructure.

It was important for me to learn more about building cybersecurity teams because it is different from building an IT team that deals with infrastructure or general services. This is a great experience and great knowledge.

For whom

CTO, Team Leads of engineering teams

Project Managers, Product Owners, Business Analysts, Product and Delivery Managers 

C-Level management, startup founders 

DevOps and DevSecOps

Frequently Asked Questions

Who is eligible to apply for the MicroMasters program?

The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of two years of work experience in a technical environment.

Note: coding experience ISN’T NECESSARY for this program.

Is it necessary to have coding skills to study at this program?

No, programming skills are not required for this program.

What is a MicroMaster's program?

A MicroMaster’s program is a mid-term program (micro-credentials program) that includes several modules from the main master’s program. In addition, graduates receive ECTS credits for completing these modules, which can be used to transfer to a master’s program later.

What format will the classes be held in?

The program consists of online lectures and hands-on webinars with the subject matter expert. Within each module, students also undergo progressive testing, and at the end of the program, they present a final project demonstrating the acquired skills.

Can ECTS credits earned through this MicroMasters program be considered towards a Master's program in Cybersecurity?

Yes, learners who complete all six educational modules successfully (with 80%+ acceptance rate) and are accepted into the Master’s program may transfer credits.

Does the MicroMasters Certificate guarantee a job interview after completing the program?

Obtaining a MicroMasters Program certificate will give you the tools to stand out in the industry. But the certificate itself does not guarantee a job interview or a job. However, you can share your certificate on your LinkedIn page and resume to demonstrate your achievements and highlight the knowledge acquired.

Partners

Learn more about the SET University program

Thank you! We will contact you shortly.

Questions left?

Get a consultation: hello@setuniversity.tech

You migt be interested in:

Cyber Defense

01.11
1.5 years 58 500 uah/semester -35%

Computer Science: Innovation Engineering

September 2024
1.5 years 58 500 uah/semester -35%

AI and Business Analytics Training for Women

August, 30
3 days Free, based on the selection of applications
We use cookies to improve your experience.