What scares us most is what we cannot see. In the digital world, that’s exactly how threats work: they don’t make noise, don’t flash red, don’t warn you. They simply appear… when it’s already too late.
The “Data Analysis in Cybersecurity” trajectory is for those who want to be prepared. For those unafraid to dive into logs, data, and signals – and able to detect danger before anyone else. This program is for those who want to protect – systematically, intelligently, and confidently.
Within the “Intelligent Data Analysis” program, all students study a shared foundation: programming, theory of computation, machine learning, databases, time series analysis, optimization, neural networks. Starting from the third year, each student chooses an educational trajectory – depending on the area they want to go deeper in.
The “Data Analysis in Cybersecurity” trajectory is an invitation to enter a world where data is not just numbers, but signals that can save systems from being breached.
💎 What makes this trajectory unique?
🔍 Digital security enhanced by AI and data
Cybersecurity is no longer just about “antiviruses.” Today, a security specialist is a data analyst who can see potential threats in logs, traffic, and behavior patterns.
Through a combination of fundamental disciplines and elective courses, you’ll gain the skills of a modern threat analyst who works proactively.
🔐 What will you study in the “Cybersecurity” trajectory?
📌 Algorithmic languages (Python, C#) – process automation and log analysis
📌 Mathematical foundations of cryptography – encryption and cryptanalysis
📌 Steganography and information protection – hiding and securing data
📌 Blockchain: fundamentals and applications – modern security technologies
📌 Anomaly and intrusion detection – analyzing traffic, logs, and journals
📌 Machine learning in cybersecurity – detecting new threats in real time
📌 Project work – your own attack detection system, secure network, or another solution
💡 What will you learn to do?
🛡️ Detect suspicious activity before it turns into an attack.
📉 Analyze traffic, logs, and behavior patterns – and spot threats others miss.
🧠 Build systems that learn to detect new types of attacks on their own.
🔐 Understand how encryption, digital signatures, and data protection work – and how they are applied in today’s world.
📊 Develop analytical tools that help security teams act fast and precisely.
💣 Stay ahead of threats – modeling risk scenarios and closing vulnerabilities before incidents happen.
🔍 This trajectory is for those who want to see the invisible threats and protect the digital world with data, analytics, and technology.
After this trajectory, you will be able to work as:
- Cyber Threat Analyst – monitoring and analyzing attacks in real time;
- Data Security Engineer – designing encryption and protection systems;
- ML Security Engineer – building machine learning models to detect anomalies and AI-powered attacks;
- Cryptanalyst – studying encryption and uncovering vulnerabilities;
- Security Engineer – integrating security at the levels of data and network analysis.
🔥 Our graduates work in companies where security is a top priority: Google, Meta, Amazon, Toshiba, Samsung Electronics, Cloud Works, NIX, Near, EPAM, and many others – as well as in state structures.
📌 Choose the “Data Analysis in Cybersecurity” trajectory – and become the one who builds the digital shield of the future.
📲 Learn more on the website
💬 Have any questions? Write to us – we’ll tell you more!