Information security - free course from IThub, training, Date: November 30, 2023.
Miscellaneous / / December 03, 2023
Specialty 10.02.05 Ensuring information security of automated systems
At IThub College you won't just get a profession, you'll master a business role!
A business role is a set of competencies of a successful specialist. What should an information security specialist, for example, be able to do? Practicing specialists and stakeholders of leading IT companies know the answer. Experts work comprehensively on the business role: create training programs and introduce children to employers.
There are 2 business roles in the specialty: “Information Security Specialist” and “Ethical Hacking Specialist.”
Demand exceeds supply
In 9 cases out of 10, Russian companies lack cybersecurity specialists! For those working in the industry, attractive conditions and interesting challenges are offered.
Learning by doing
We have our own cyber testing ground and our own information security laboratory. We are conducting cyber exercises online!
Learning from the best
Students undergo internships and internships at the companies Infotex, Security Code, Perspective Monitoring, InfoWatch. There, the guys practice as assistant specialists, complete tasks and gain experience!
Sharing our experience
Cybersecurity guys regularly conduct master classes for schoolchildren: about threats from Wi-Fi hacking, auditing the security of information systems, storing passwords and much more.
2
courseChief specialist of the department for monitoring and assessing network security risks of the State Unitary Enterprise "Moscow Metro" Teaches the discipline "Regulatory support of cybersecurity"
13 years of service in the Information Security Center of the FSB of Russia. Member of interdepartmental working groups in the field of information security, computer information and e-commerce. Author of publications in departmental and professional publications on information security and computer crime investigation
Information protection specialist
Develops information security systems, audits and monitors them, and analyzes information risks.
Program based on 9th grade
Program based on 11th grade
Ethical Hacking Specialist
Implements and maintains protection of systems from unauthorized access, participates in vulnerability testing and conducts information security audits.
Program based on 9th grade
Program based on 11th grade