Undergraduate Programme

CYBERSECURITY

QUALIFICATION OBJECTIVES OF THE PROGRAMME

The goal of the Cyber Security program is to form and develop professional competencies in students, allowing them to apply modern information protection technologies, choose means and tools of information protection, minimizing threats of unauthorized access to data.

The development of digital technologies has led to the emergence of a large number of digital threats on the Internet.
In response to the threats, a field of knowledge has emerged that deals with the development and implementation of technologies to protect information systems – cybersecurity.

The goal of cybersecurity is to ensure the three most important principles: confidentiality, integrity and availability.
Today, the issue of cybersecurity of various government agencies, data of commercial organizations, and personal data of individuals, to which access must be restricted, is extremely acute.

The program is aimed at training researchers, analysts and developers in the field of information protection.
The peculiarity of the program is specialization in the field of development and application of mathematical models and methods for data protection in information systems of various purposes, as well as specialized software.

Language of instruction: UZBEK / RUSSIAN

Modes of study:

  • Full-time classes: Monday through Saturday during the day
  • Distance Learning: 4 weeks at the end of each semester at TIUE.

Upon graduation, a Bachelor’s degree in Cybersecurity (TIUE) is awarded

The structure of the qualification consists of 27-30 compulsory modules, totaling 480 credits towards the qualification.

Duration of training for:

  • full-time education – 4 academic years (from October to June). Training is conducted during the day in the form of lectures, tutorials, seminars, practical classes, master classes and industrial practice.
  • part-time students – 5 academic years (from October to June). The distance learning program consists of distance learning in the form of online classes during the semester, and two weeks of face-to-face classes at the end of each semester.

The structure of the qualification consists of
27-30 compulsory modules totaling 480 credits for the qualification.

Duration of study for:

  • full-time students for 4 years (from October to June). Training is conducted during the day in the form of lectures, tutorials, seminars, practical classes, master classes and industrial practice.

OPEN THE DOORS TO A MODERN WORLD OF POSSIBILITIES!

REASONS FOR CHOOSING THIS PROGRAMME

1HIGH DEMAND

Today, as the world is increasingly moving into virtual reality, the problem of protecting personal and commercial information is particularly acute.
That’s why cybersecurity specialists are among the most in-demand on the labor market.

Cybersecurity specialists work in large financial and IT companies, the value of such personnel is noted in government agencies, defense departments, where their main task is to ensure national security and prevent infiltration into the state infrastructure.

The need for such specialists is particularly evident now, with the rise in cybercrime and cyberterrorism.
Hacker attacks are being recorded in every corner of the world.

Graduates of the program are most in demand in executive authorities, IT departments dealing with the security of information systems and data of government agencies, state corporations, financial institutions, IT companies.

2CAREER OPPORTUNITIES

As more and more organizations and government agencies go digital, the threat of cybersecurity breaches is enormous.
The result is obvious – the need for professionals in this field of work is growing significantly day by day, and a career in cybersecurity is becoming a life choice for many.

A cybersecurity specialist works to protect automated systems, programs and networks from digital attacks.
The profession is suitable for those who can analyze large amounts of information, have a mathematical mind and are able to make quick decisions.

A cybersecurity specialist identifies information security threats and data loss risks, develops and implements threat countermeasures and solutions to protect against information loss; ensures data security and confidentiality; participates in the development and implementation of IT solutions.

Cybersecurity specialists are in demand in large corporations and government organizations such as:

  • ministries and agencies;
  • financial institutions, banks;
  • MIA;
  • outsourcing companies providing IS services;
  • IT companies involved in software development;
  • research institutes and centers;
  • Internet service providers and mobile operators;
  • manufacturing enterprises.

3WHAT TASKS A CYBER SECURITY SPECIALIST WILL PERFORM

  • protection of personal data, trade secrets and other classified information;
  • taking measures to combat hacker attacks;
  • protection against intellectual property theft;
  • maintaining information security of critical facilities: banks, enterprises, utilities, healthcare institutions, etc.;
  • Identification of vulnerabilities in existing networks and their prompt elimination.

4WHAT KNOWLEDGE AND SKILLS WILL BE ACQUIRED

  • A high level of programming skills;
  • attentiveness and accuracy when working with code, ability to find hidden and non-obvious sources of infection;
  • combining programming skills with knowledge of the physical properties of technical devices;
  • analytical skills, the ability to calculate the consequences of certain changes;
  • the ability to quickly assess threats and their sources;
  • Ability to work with large data sets;
  • understanding of the principles of cyber attacks, knowledge of possible ways to protect against them.

5INTERNATIONAL OPPORTUNITIES:

Cybersecurity specialists are in demand all over the world and have a chance to study outside their home country.
This broadens the horizons of professional growth and allows you to learn from the best experts around the world.

6SALARY

This profession is among the highest paid in the IT sector and serves as a strong guarantee against employment problems.

7RECOGNIZED HIGHER EDUCATION DEGREE

Upon completion of the bachelor’s degree, graduates will receive appropriate professional training.

In accordance with Article 31 of the Law of the Republic of Uzbekistan “On Education”, diplomas issued to graduates of licensed non-state higher education institutions(https://lex.uz/ru/docs/5013009, https://tiue.uz/ru, https://stat.edu.uz/Univer-list.php paragraph 8) are recognized in the territory of the Republic of Uzbekistan on an equal footing with diplomas of state higher education institutions.

Upon successful completion, students will receive a TIUE Bachelor’s Degree in “Cybersecurity”.

8PROFESSIONAL TEACHING TEAM

For our professors and instructors, nothing is more exciting than teaching students who are ready to dive into the unknown with them. Passionate and dedicated teachers are ready to give inquisitive students the skills, confidence and knowledge they need for the future. Our faculty members are true experts and practitioners with extensive experience in companies and with vast experience in academic research.

Our faculty professors strive to not only teach students the skills they need for their first job, but also to prepare them for any path, any future, and any challenge.

9LEARNING STAGES

The specialty provides for the study of the following specialization modules: hardware computing; operating systems; data transmission interfaces; computer networks; identification, access and surveillance systems; basics of computer security; physical basics of data storage, processing and transmission; cryptographic methods of information protection; computer steganography; communication systems and information transmission networks; data models and DBMS; technical systems and methods of information protection; hardware and software means of ensuring the security of information. Training takes place in multimedia classrooms. Practical skills are practiced on modern equipment in joint laboratories with the following companies: EPAM Systems; Itransition; Motorola; D-Link; Sciense Soft Group; Nauchsoft.

Students will gain a basic understanding of object-oriented programming languages and the creation of efficient code, which will give them an understanding of software development, as well as knowledge and skills in planning, configuring, building and managing networks (such as LAN, PAN, MAN, WAN), network monitoring and network security, network protocols and standards.
The study of mathematics will provide students with a fundamental foundation for successful learning in general and specialized disciplines.
It is through mathematical knowledge that many professional and general professional competencies are formed.

Students will also learn the principles and methods of information protection in computer networks, the peculiarities of building computer systems that use protected information exchange, learn to develop secure applications for Internet sites, assess the security of ready-made software solutions for building Internet sites, study ways to protect against hacking and security of working Internet sites and servers located on the Internet, learn the principles of building information protection in the OS and analyzing the reliability of OS protection, the principles of the protection of information in the OS, the principles of the protection of information in the OS and the analysis of the reliability of the protection of the OS, the principles of the protection of information in the OS.

The modules of the specialty “Cybersecurity” will provide knowledge and skills of modern mathematical methods of machine learning, designed to analyze data and build predictive models, will familiarize students with traditional artificial intelligence, with methods based on neural networks for information systems and knowledge acquisition from big data, will master the knowledge of control-testing and logical-analytical methods of analyzing the security of software and ways to ensure the reliability of programs to control their technology, and will provide students with the knowledge of the methods of software security analysis.

Tadjikhodjaeva Elvira Rashidovna,
Head of the Department of
Information Technology, Systems
Engineer, Tashkent State Technical University, 1996

LEARNING STAGES

YEAR 1

There are modules focused on providing basic concepts of object-oriented programming, ways of creating effective code, development of students’ skills of analysis and design in the organizational context, understanding of modern technologies and practice of using modern IT tools, study of computer networking technologies, protocols, security, standards, fundamental programming concepts with a focus on the whole process of software development, including the environment in which the software is developed.

YEAR 2

“YEAR 2” modules will provide students with a thorough understanding of the activities of a systems analyst and systems designer, the ability to apply modern methods of designing, implementing, maintaining and managing information systems for various purposes, acquire knowledge and skills in planning, configuring and managing networks (such as LAN, PAN, MAN, WAN), as well as network administration and network security skills, learn to develop and implement software and solve complex software problems.

YEAR 3

“YEAR 3” modules will provide knowledge and skills to perform advanced data analysis, manage complex information systems, learn to develop and implement systems and/or processes that solve IT industry problems and/or improve existing systems, develop students’ critical understanding of current and modern concepts of networking technologies in the IT industry, e-commerce.

YEAR 4

In Year 4, students will study a variety of modules covering the following disciplines: Software Engineering, Advanced Data Analytics, Custom Design, Artificial Intelligence and Machine Learning, IT Project Management, Pedagogy and Psychology and will also undertake a qualifying industrial placement.

CURRICULUM

Full-time education

1-KURS
1-SEMESTR

1) Modern History of Uzbekistan (10-credit)
2) Computers and Networking Technologies (10-credit)
3) Data Structure and Algorithms (20-credit)
4) Mathematical Analysis 1 (20-credit)

2-SEMESTR.

5) Philosophy (10-credit)
6) Fundamentals of Information Security (10-credit)
7) Fundamentals of Programming (20-credit)
8) Mathematical Analysis 2 (20-credit)

2-KURS
3-SEMESTR

1) Database Fundamentals (10-credit)
2) Networks and Information Transmission Systems (20-credit)
3) Legal Foundations of Cybersecurity (20-credit)
4) Web Security (10-credit)
5) Mathematical Methods for IT (10-credit)

4-SEMESTR

6) Operating Systems Security (10-credit)
7) Python Programming (20-credit)
8) Computer Network Security (10-credit)
9) Artificial Intelligence and Machine Learning (20-credit)

3-KURS
5-SEMESTR

1) Software Security (10-credit)
2) Ethical hacking (10-credit)
3) Software Engineering (20-credit)
4) Cryptographic Security Techniques (20-credit)

6-SEMESTR

5) Big Data Analytics (20-credit)
6) Malware Defense (20-credit)
7) Internet of Things and Robotics (20-credit)
8) Technology Practice (10-credit)

4-KURS
7-SEMESTR

1) Personal Data Protection (20-credit)
2) Cryptocurrencies and Blockchain Technologies (20-credit)
3) Pedagogy and Psychology (10-credit)
4) Individual Design (10-credit)

8-SEMESTR.

5) Qualification practice (20-credits)
6) Final Qualification Paper or Final Examination (20-credits)

Distance learning

1-KURS
1-SEMESTR

1) Computers and Networking (10-credit)
2) Data Structure and Algorithms (20-credit)
3) Mathematical Analysis 1 (20-credit)

2-SEMESTR.

4) Modern History of Uzbekistan (10-credit)
5) Philosophy (10-credit)
6) Fundamentals of Information Security (10-credit)
7) Mathematical Analysis 2 (20-credit)

2-KURS
3-SEMESTR

1) Religious Studies (10-credit)
2) Programming Fundamentals (20-credit)
3) Web Security (10-credit)
4) Mathematical Methods for IT (10-credit)

4-SEMESTR

4) Networks and Information Transmission Systems (20-credit)
5) Legal Foundations of Cybersecurity (20-credit)
6) Operating Systems Security (10-credit)

3-KURS
5-SEMESTR

1) Python Programming (20-credit)
2) Computer Network Security (10-credit)
3) Artificial Intelligence and Machine Learning (20-credit)

6-SEMESTR

4) Software Security (10-credit)
5) Software Engineering (20-credit)
6) Cryptographic Security Techniques (20-credit)

4-KURS
7-SEMESTR

1) Ethical hacking (10-credit)
2) Big Data Analysis (20-credit)
3) Malware Defense (20-credit)

8-SEMESTR.

4) Personal Data Protection (20-credit)
5) Internet of Things and Robotics (20-credit)
6) Individual Design (10-credit)

5-KURS
9-SEMESTR

1) Cryptocurrencies and Blockchain Technologies (20-credit)
2) Pedagogy and Psychology (10-credit)
3) Technology Practice (10-credit)

10-SEMESTR.

4) Qualification practice (10-credit)
5) Graduation qualification work or final exam (10-credit)

Note.
All credits are listed under the UK education system. Depending on the language of instruction, there may be slight differences in the Curriculum. At the same time, the University has the right to make some changes and additions to the Curriculum.

Ruslan Rustamovich Sultanov
Professor, Department of Cyber Security,
Degree of Doctor of Technical Sciences (DSc) – Moscow Technical University of Communications and Informatics, 2022.

Sadritdinova Zulfiya Israilovna,
Associate Professor of the Department “CYBERBUSSECURITY”,
Degree of Doctor of Philosophy (PhD), Candidate of Physical and Mathematical Sciences – Tashkent State University, 1994.

Akhmedova Iroda Nurmukhamedovna
Lecturer, Department of “CYBERBUSSECURITY”
Applied Mathematics, Tashkent State University,1994

Ruziev Ulugbek Shukhratovich
Lecturer, Department of CYBERBUSSECURITY
Master’s Degree in Mathematics and Informatics – National University of Uzbekistan named after M.V. Shukhratovich. Mirzo Ulugbek, 2019.

TUITION FEE

For the school year


Programs


Form of training

Duration of training (academic year)

Payment-amount of contract
PROGRAMS IN UZBEK AND RUSSIAN LANGUAGES ENGLISH PROGRAMS
Local
for students
(thousand Sum)

GRANT

For international students
(USD)
Local
for students
(thousand Sum)

GRANT

For international students
(USD)


Cybersecurity

Full-time education 4 18 000 3 000 1 400 Х Х
Distance learning 5 11 200 Х 800 X X

*) International students on the territory of Uzbekistan pay tuition fees in US dollars, at the exchange rate set by the Central Bank of the Republic of Uzbekistan on the day of payment. Outside Uzbekistan, the payment is made in US dollars, in the specified amount.

ADMISSION REQUIREMENTS

Admission to the first year of study

Necessary documents:

  • Document confirming secondary or specialized secondary education (certificate/diploma with an attachment)
  • Copy of passport / ID-card
  • A 5×5 photo on a white background

Academic Requirements:

  • Successful completion of the internal math exam;
  • To study in TIUE programs, all applicants must apply ONLINE ONLY ON THE UNIVERSITY’S OFFICIAL WEBSITE(tiue.uz).

Admission to the "Year 1" of the programme taught in English:

Necessary documents:

  • Document proving 12 years (9 + 3) of education (certificate/diploma with attachment) OR International Foundation Programme (IFP) certificate OR a document proving completion of the first year of studies at a local/foreign university
  • Copy of passport / ID-card
  • A 5×5 photo on a white background

Academic Requirements

Successful completion of the internal exam on:

Math;

English language proficiency or submission of an English language certificate (IELTS 5.5 or above or equivalent)

For TIUE programs, all applicants must apply ONLINE ONLY through the UNIVERSITY’S OFFICIAL WEBSITE (www.tiue.uz)

Cybersecurity specialist is the most promising profession of the future! Every day, organizations are becoming more and more dependent on the data that drives their business, which is why protecting this valuable information is becoming a top priority.

The growing dependence on digital technology is increasing the demand for cybersecurity professionals.
Cyberattacks are becoming more complex and diverse, and organizations are realizing that they need qualified experts to counter these threats.

The importance of IS specialists cannot be underestimated.
Companies are actively increasing investments in information security in an effort to ensure reliable protection of their resources.
This, in turn, ensures that cybersecurity specialists are in high demand on the labor market.

Looking ahead, this trend is only set to intensify.
Given the ongoing dynamics in technology, the demand for security experts is expected to continue to grow, their specialization to deepen and the horizons for professional growth and development to expand.

Become part of the innovators, leaders and creators of the future. Apply now and start your path to success in the IT industry!