Specialization in cyber security

Explore the full module of cybersecurity items. Become a Cybersecurity Specialist and Earn a Specialization Certificate

The program starts on 06.11.2022

Presented by
the Scientific Cyber Security Association

About specialization

The Cybersecurity Specialization is a complete curriculum in today's topical subjects. Upon completion of the specialization, participants will have the opportunity and all the necessary skills to continue working at a professional level in such in-demand areas as cybersecurity and computer science. The duration of the full program is 12 months.

what will you learn

Begginer

Anyone can start specialization, the training module starts from scratch

Topical subjects

Only topical cyber security and computer science subjects will be covered within the specialization

Optimal time

The duration of each training module is 1.5 - 2 months (8 hours per week), which is quite enough for an in-depth study of the subject.

Certificate of Specialization

After successfully completing all the modules of the program, you will receive an official certificate of specialization.

How specialization works

Passing training courses

The specialization includes various training courses. After completing each course, the student acquires the necessary skills in a particular direction. Some courses are extensions of other specialization courses that provide students with in-depth and practical knowledge.

Obtaining a certificate

After successfully completing the specialization, the student will receive an official certificate from the Scientific Cybersecurity Association, which will confirm the student’s thorough knowledge.

Specialization courses

Course

1

Lecturer: Maksim Iavich

A training course is a way to learn the theoretical and practical application of modern programming
standards. It will study the modern, dynamic and multi-paradigm language "Python". which includes
object-oriented, procedural, functional and imperative programming.

Course

2

Lecturer: George Iashvili

The course will teach students to apply basic security mechanisms in practice. The course will also teach students how to evaluate individual security scenarios and what to consider and/or act on in the face of various cyber threats.

Course

3

Lecturer: David Taliashvili

The training course is a means of mastering the theoretical and practical application of modern standards in the field of networking. It will cover modern approaches to help you plan and configure network.

Course

4

Lecturer: David Taliashvili

The training course is a means of mastering the theoretical and practical application of the Distance Vector routing protocols. It will cover modern approaches to help you plan and configure your network.

Course

5

Lecturer: David Bochorishvili

Students will learn the basic techniques for creating static web pages using HTML and CSS technologies. In addition, the course will teach students interactive and visual effects using HTML and CSS web technologies. Students will learn the basic concept of a markup language and its practical application.

Course

6

Lecturer: David Taliashvili

The training course is a way to learn the theoretical and practical use of the Link State routing protocols. It will cover modern approaches to help you plan and configure network.

Course

7

Lecturer: Temuri Takalandze

A training course is a way to learn the theoretical and practical application of modern programming standards. It will study modern and dynamic PHP, which includes object-oriented and procedural programming.

Course

8

Lecturer: David Taliashvili

The training course is an introduction to the principles of network security. It will study the principles of protecting the local network.

Course

9

Lecturer: Maksim Iavich

Students will learn the concepts of symmetric encryption and authentication, as well as the concepts of public key encryption, digital signatures, and key distribution. They will be familiar with common examples and cryptographic schemes including AES, RSA, Diffie-Hellman key distribution protocol, and how and when to use them. Students will be able to design, create and analyze simple cryptographic solutions. Students will be able to implement attacks on insecure schemes and implement existing schemes in the Python programming language.

Course

10

Lecturer: David Bochorishvili

Today, JavaScript is one of the most demanding and flexible programming languages used in many areas. With JavaScript, you can create interactive web pages without sending requests to the server, which means that you can create dynamic web systems using this programming language.

Course

11

Lecturer: Maksim Iavich

The purpose of the training course is to teach students how to write programs in the C++ programming language. The course also aims to teach students how to read and analyze programs written in the C programming language to identify possible weaknesses in the code.

Course

12

Lecturer: George Iashvili

The course will teach students how to create static and dynamic websites using one of the most common CMS, WordPress.

Course

13

Practical security

Lecturer: George Iashvili

The training course includes a practical discussion of modern cyber attacks and the use of appropriate cyber security tools and techniques against them. The course will discuss different types of cyber attacks and they will be identified

Course

14

Lecturer: Maksim Iavich

Software is everywhere: in laptops and desktops, in mobile phones, in the power system, even in our cars. Software is the machine that runs the economy and our personal lives. But the prevalence and importance of software makes it a target for many attacks.

Course

15

Lecturer: Sergo Simonov

Linux runs on 100% of the world’s supercomputers, most of the servers that power the Internet, most of the world’s financial transactions, and more than two billion Android devices.

Course

16

Lecturer: Maksim Iavich

As part of the course, the student will learn how to solve real analytical problems using the Python programming language. The course covers: algorithms using Python, testing and debugging using Python, working with classes in Python, algorithmic complexity and data structures.

Course

17

Lecturer: Maksim Iavich

As part of the course, students will study a detailed analysis of various systems and identify security weaknesses in these systems. Also, as part of the course, students will learn how to penetrate systems using discovered security weaknesses.

Course

18

Lecturer: George Iashvili

As part of the course, students will learn how to collect, process and analyze open access information. The course includes both the use of OSINT tools and many practical methods with of so-called manual approach.

Course

19

Lecturer: George Iashvili

As part of the course, the student will study buffer overflow attacks, Windows buffer overflow attacks, processor register management and Linux buffer overflow attacks. Along with this, the course will cover working with exploits, their configuration and modification, downloading malicious files to a compromised machine, privilege escalation, attacks on web applications, XSS (cross-site scripting), cookie and session theft, as well as SQL injection.

Course

20

Lecturer: Maksim Iavich

Django is a free (open source) platform for building web applications and websites. Django is written in the Python programming language. Framework – a set of tools with which web applications and sites are created faster and easier than developing similar systems from scratch. Django has its own structure and file structure, which is designed through the so-called engine or kernel.

Course

21

As part of the final project, students will use the knowledge gained during the study of specialization subjects. The final project covers practical issues from various areas of cybersecurity. During the project, students will be divided into groups to perform special tasks. Upon successful completion of the final project, the student receives a certificate of specialization.

Lecturers

სასწავლო კურსების ლექტორები

მაქსიმ იავიჩი

პრეზიდენტი და დამფუძნებელი "SCSA"

გიორგი იაშვილი

დეველოპერთა გუნდის მენტორი"Utoweb"

დავით ბოჭორიშვილი

დეველოპერი "Utoweb"

დავით ტალიაშვილი

ქსელების მთავარი სპეციალისტი GPD Host

არჩილ ჩაგელიშვილი

IT დეპარტამენტის ხელმძღვანელი adjarasport

თემური თაკალანძე

Back-end დეველოპერი "Omedia"

125370249_1242865596083319_5211106229509246756_n

გიორგი ახალაია

კავკასიის უნივერსიტეტის ლექტორი

სერგო სიმონოვი

DevOps ინჟინერი / IT მენეჯერი Omedia

სპეციალიზაციის სერტიფიკატს გააჩნია მრავალი უპირატესობა

სპეციალიზაციის საფასური შეადგენს 4800 ლარს
გადახდა შეიძლება განხორციელდეს ოთხ ეტაპად

დაამატეთ კიბერ უსაფრთხოების სპეციალიზაციის სერტიფიკატი სხვა მონაცემებთან ერთად LinkedIn-ის პროფილში

რას ამბობენ კურსდამთავრებულები ?

I agree to Privacy Policy of Scientific Cyber Security Association