Where Science, Entrepreneurship, and Technology Unite

Cyber Defense

A comprehensive program dedicated to information security management, security team management, and the combination of AI and cyber defense. The program is licensed by the Ministry of Education and Science of Ukraine.

Learn more

Cyber Defense

Program Start: 01.11
Duration: 1.5 years
Application deadline: 20.10
Language: Eng/Ua
Format: Hybrid
ECTS: 90
Price: 58 500 uah/semester
Discount: -35%

Program overview:

In today’s world, cybersecurity is a key component for the successful operation of companies. We have developed this master’s program for those who want to implement cyber defense at the strategic level and build effective information security systems in cyberspace.

In 18 months, you will understand business processes in data security, risks and benefits of using AI in the context of cybersecurity, ethical and legal aspects of information security. You will also consider scenarios of machine learning application in the context of cybersecurity. All this will be based on real cases. In addition, you will go from learning the basics of digital security and potential cyber threats to implementing protection scenarios at the strategic level.

As part of your master’s thesis, you will be able to develop your own startup in the university’s accelerator or develop a tech solution for real companies.

What will you learn?

How to build cyber security systems in accordance with international standards: GDPR, PCI DSS, Privacy Shield
How to apply Business Continuity Planning and Incident Response practices to protect against potential cyberattacks
How to use machine learning models to detect anomalies and fraud
How to build business processes and risk management models for data security and quality
Навчитесь вибудовувати бізнес-процеси та моделі управління ризиками в сфері безпеки та якості даних
Consider the ethical and legal aspects of information security in product development

Requirements for applicants

Bachelor's degree
English level B2+
Ability to program in Python or another language
EIA certificates of 2023 or 2024 and the compiled EEFI
Базове розуміння мереж та розуміння того, як будуться системи кібербезпеки в компаніях (на підприємствах)
Practical ability to use Linux
Willingness to allocate about 20 hours a week to study


A comprehensive academic program developed in accordance with the requirements and standards of the Ministry of Education and Science of Ukraine 

Adaptive online learning — can be combined even with a full-time job

Exclusive access to the bootcampsevents and tech communities partnering with SET University

Mentoring approach in teaching from leading teachers with academic and practical experience from Ukraine, Europe and the States

Fundamental education combined with practice, modern technologies and work on the real challenges of tech companies

Own startup as part of a Master thesis, in-depth understanding of tech businesses and development of leadership skills

Program Units

Module 1: Cybersecurity Risk Management

Learn the key principles of information security analysis, assessment, and risk mitigation based on qualitative and quantitative data methods.

  • Submodule 1 — IT Risk Management, Roles definition
  • Submodule 2 — Identifying and assessing Cybersecurity Risks
  • Submodule 3 — Identifying Possible Cybersecurity Risk Mitigation Measures
  • Submodule 4 — Monitoring process
  • Submodule 5 — Сybersecurity compliance standards/frameworks that contain best practices and requirements for managing cyber risk: ISO, NIST, RMF, etc

Module 2: Research and development activities

We will cover the basics of scientific research, starting from the definition of the problem and methodology and ending with the verification of the results. We will also take a closer look at the organization of computer science.

  • Submodule 1 — Methodological foundations of scientific research and pedagogical activity
  • Submodule 2 — Methods and ways of conducting scientific research

Module 3. Cybersecurity business management

We will analyze the key concepts and best examples of cybersecurity risk management in a business context. Within the module, we will consider in detail how operational processes are related to data security and quality.

  • Submodule 1 — Executive managers, roles, responsibilities, skills
  • Submodule 2 — Executive Leadership for Information and Chief Security Officers
  • Submodule 3 — Decision making styles
  • Submodule 4 — Managing in Turbulent Times
  • Submodule 5 — VUCA and BANI World

Module 4. Quantum cryptography

We analyze modern mathematical methods and means of ensuring data quality and security.

  • Submodule 1 — Concept of quantum information and quantum channel
  • Submodule 2 — Principles of quantum and post-quantum cryptography
  • Submodule 3 — The space of states of a quantum system
  • Submodule 4 — Operators on state spaces. Entanglement, its properties and applications
  • Submodule 5 — Elements of computational complexity. Complexity functions. Classes of difficulty
  • Submodule 6 — Solvable and unsolvable problems. Practical intractability

Module 5. Project Management

We consider the key strategies of technical project management and software development processes. Using examples, we analyze the main models, skills and competencies necessary for managers.

  • Submodule 1 — Applying Project Management to Cybersecurity
  • Submodule 2 — Project phases, engagement models, Project Methodology, Areas of project management
  • Submodule 3 — Leadership Models, Competencies and Skills, Leadership Mindset and Leading teams

Module 6. Design and development of high-quality and security computer systems (Pentesting)

  • Architectural frameworks: SABSA, RMF, NIST

Module 7. Intelligent Security Systems

  • Submodule 1 — Introduction to Intelligent Security Systems
  • Submodule 2 — Machine Learning and Artificial Intelligence for Security
  • Submodule 3 — Intrusion Detection and Prevention Systems (IDPS)
  • Submodule 4 — Adaptive and Self-Learning Security Systems

Module 8. Security coding

Методи розробки безпечного програмного забезпечення

  • Submodule 1 — Fundamentals of secure coding: principles and concepts related to secure coding
  • Submodule 2 — Input/output security: protection against input/output-related attacks, input validation and filtering
  • Submodule 3 — Defense against attacks such as stack overflow and buffer overflow
  • Submodule 4 — Security in concurrent programming
  • Submodule 5 — Code security auditing and static analysis

Module 9. Data and database management

Управління даними та базами даних та виявлення знань для безпечних та надійних систем

  • Multi-faceted discipline that covers data governance, integration, architecture, quality, security and other crucial topics

Module 10. Capstone project

Розробка та презентація курсового проєкту в межах однієї чи кількох дисциплін.

Module 11. Startup incubator

Літня практична робота над стартапом/технологічним проєктом, який стане основою для подальшої магістерської роботи. В межах цього модулю вас супроводжуватимуть ментори, які надаватимуть консультації, проводитимуть семінари та лекції присвячені всім аспектам запуску стартапів. Це буде чудова можливість для валідації своєї ідеї з експертами та формування нетворку.

Module 12. Master thesis

Розробка стартапу або проєкту, який відповідає загальному напрямку обраної вами магістерської програми. В межах магістерської необхідно описати досвід розробки та створення власного рішення, а також презентувати напрацювання наприкінці навчання. Це буде фінальним етапом навчання в межах магістратур SET.

You can also choose additional educational modules and supplement the curriculum

The Master's program is designed in such a way that you can also add interesting modules to the program. We strive to create a personalized educational experience that will benefit you


Oleksii Baranovskyi

President of ISACA Kyiv Chapter — Information Systems Audit and Control Association. Expert with 15+ years of experience in the field of information and cybersecurity. Worked as a Security Analyst, CISO.
Ph.D. in Information Technology, Associate Professor at NTUU Kyiv Polytechnic Institute, Senior Lecturer at Blekinge Institute of Technology in Sweden.

Nick Gicinto

Former American CIA Officer, ex-Tesla, ex-Uber.

Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.

For whom?

CTOs and Team Leaders of engineering teams

Engineers, software and hardware developers

Security teams (DevOps, DevSecOps and System admins)

Teams involved in a tech product development (Project та Product Managers, Product Owners, Delivery Managers, Business Analysts, QA Engineers, Program Managers)

Bachelor’s degree graduates in any IT field who have passed the state exam

Frequently asked questions

Is it necessary to have prior cyberdefense education to apply for this program?

To study effectively in this program, you need to have a basic understanding of technology, which can be gained through previous education in any technology field or experience working in an tech company.

How long does the program last?

The program consists of 16 modules and lasts for 1.5 years.

Is it a full-time education? Does it impact military mobilization when studying at Master's programs at SET University?

According to the Law of Ukraine “On Mobilization Training and Mobilization”, a list of persons who are not subject to conscription during mobilization is defined. Yes, according to Art. 23, conscription for military service during mobilization, for a special period are not subject to: students of higher education who are studying on a full-time basis. Education at SET University takes place exclusively on a full-time basis.

Studying at Master’s programs at SET University is the basis for receiving a deferment from mobilization, since it is a full-time study. Students of higher education studying full-time receive a deferment for the duration of their studies. At the same time, you still have the opportunity to voluntarily join the Armed Forces, and we also offer scholarships for the members of the Armed Forces of Ukraine, National Guard.

Is it possible to combine studying with a full-time job?

Yes, we are developing a program, first of all, for those who already have experience in IT and are building a career. In addition, the training format will be hybrid, so that all participants can combine training with work.

Is it necessary to have coding skills to study at this program?

Programming skills are optional for admission to the program. However, knowing and understanding the rules of writing code will help you master the curriculum. We also advise you to take into account that students will write code during their studies.

What format will the classes be held in?

The studies take place in the format of blended-hybrid learning. Educational content will be available on the online platform, and all lectures and seminars will be held online according to a predetermined schedule. Online workshops with teachers and group work will be held several times a week, also online.

We will announce the detailed schedule in September before the start of the studies. You will be notified about all offline activities and student meetups in advance so you can plan your schedule.

How do I apply to participate in the competitive selection process for a master's degree?

It is possible to submit an application for participation in the competitive selection for studies to obtain a Master’s degree using a personal electronic account registered on the website of the Unified State Electronic Database for Education.

SET University has a consultation center of the Admissions Committee to provide assistance to applicants during the registration of a personal electronic account and submission of applications in electronic form. Entrants can contact the counseling center:

if there are discrepancies in the data of the entrant to The Joint State Electronic Base on Education Issues (surname, first name, patronymic (if available), date of birth, gender, citizenship, etc.), in the document on previously obtained education (basis of admission), in the data of participants of the Ukraine’s state exams;

in case of submission of a document on previously acquired education (the basis of admission), information about which is not available in the Joint State Electronic Base on Education Issues, provided that the documents on education were issued before the introduction of photopolymer technologies for their production.


About SET:

Ukrainian technology university providing quality higher education for future leaders of the Ukraine's tech industry

SET University (University of Science, Entrepreneurship and Technologies “SET University”) provides world-class higher education in the field of IT and makes it more accessible to Ukrainians. The university combines a modern academic approach and strong expertise in technology with a focus on entrepreneurial culture, research and a developed community.

The university’s mission is to provide education to tech talents and future founders with the aim to accelerate Ukraine’s economic recovery.

Learn more
Supported by the Ministry of Digital Transformations, Fund of the President of Ukraine, USAID

Learn more about this Master's program at SET University

Thank you! We will contact you shortly.

Questions left?

Get a consultation:

You may also be interested in other programs:

Computer Science: Innovation Engineering

September 2024
1.5 years 58 500 uah/semester -35%

SET Workshops: Cybersecurity

2 weeks Free accesses
We use cookies to improve your experience.