{"id":5175,"date":"2025-09-01T10:27:00","date_gmt":"2025-09-01T07:27:00","guid":{"rendered":"https:\/\/kb.khmnu.edu.ua\/?page_id=5175"},"modified":"2026-03-09T16:03:34","modified_gmt":"2026-03-09T14:03:34","slug":"bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi","status":"publish","type":"page","link":"https:\/\/kb.khmnu.edu.ua\/en\/bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi\/","title":{"rendered":"Bachelor's degree"},"content":{"rendered":"<div class=\"wp-block-uagb-tabs uagb-block-208373c8 uagb-tabs__wrap uagb-tabs__hstyle4-desktop uagb-tabs__vstyle6-tablet uagb-tabs__stack1-mobile\" data-tab-active=\"0\"><ul class=\"uagb-tabs__panel uagb-tabs__align-center\" role=\"tablist\"><li class=\"uagb-tab uagb-tabs__active\" role=\"none\"><a href=\"#uagb-tabs__tab0\" class=\"uagb-tabs-list uagb-tabs__icon-position-left\" data-tab=\"0\" role=\"tab\"><div>F5 \u201cCybersecurity and information protection\u201d<\/div><\/a><\/li><li class=\"uagb-tab\" role=\"none\"><a href=\"#uagb-tabs__tab1\" class=\"uagb-tabs-list uagb-tabs__icon-position-left\" data-tab=\"1\" role=\"tab\"><div>125 \u201cCybersecurity and information protection\u201d<\/div><\/a><\/li><li class=\"uagb-tab\" role=\"none\"><a href=\"#uagb-tabs__tab2\" class=\"uagb-tabs-list uagb-tabs__icon-position-left\" data-tab=\"2\" role=\"tab\"><div>125 \"Cybersecurity\"<\/div><\/a><\/li><\/ul><div class=\"uagb-tabs__body-wrap\">\n<div class=\"wp-block-uagb-tabs-child uagb-tabs__body-container uagb-inner-tab-0\" aria-labelledby=\"uagb-tabs__tab0\">\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Educational programs<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/op\/b\/f5-kbzi-2025.pdf\">Educational and professional program \u201cCybersecurity and Information Protection\u201d. 2025<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/proyekty-op\/bachelor\/f5-kbzi-2025.pdf\">Project of the educational and professional program \"Cybersecurity and Information Protection.\" 2025<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/proyekty-op\/bachelor\/f5-kbzi-2025-obg.pdf\">Table of proposals for the draft educational and professional program \"Cybersecurity and Information Protection.\" 2025<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Curriculum<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/125_kb_2025-np_bak-skan.pdf\">Curriculum. Cybersecurity and Information Protection. 2025. Full-time education based on complete secondary education.<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Reviews of educational programs<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/25-reczenziya-hmelnyczkinfokom.pdf\">Khmelnitskinfocom Limited Liability Company<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/25-reczenziya-kiberpolicziya.pdf\">Department for Combating Cybercrime in Khmelnytskyi Region of the Cyber Police Department of the National Police of Ukraine<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/25-reczenziya-upravlinnnya-czrczt....pdf\">Department of Digital Development, Transformation, and Digitalization of the Khmelnytskyi Regional Military Administration<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Work programs<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>1st year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-3 wp-block-columns\">\n<div class=\"wp-container-1 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>1st semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.01 Higher Mathematics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp01-25-rp-vyshha-matematyka.pdf\">Work program<\/a>)<\/li><li>OZP.02 Discrete Mathematics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp02-25-rp-dyskretna-matematyka.pdf\">Work program<\/a>)<\/li><li>OZP.03 Algorithms and Programming (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp03-25-rp-algorytmizacziya-ta-programuvannya.pdf\">Work program<\/a>)<\/li><li>OZP.04 Physical Education and Health Basics (Work Program)<\/li><li>OZP.05 English for Professional Purposes (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp_05_fit_kbzi_1_kurs_2025_baza.pdf\">Work program<\/a>) <\/li><li>OFP.01 Basics of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp01-25-rp-osnovy-informaczijnoyi-bezpeky.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-2 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>2nd semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.01 Higher Mathematics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp01-25-rp-vyshha-matematyka.pdf\">Work program<\/a>)<\/li><li>OZP.03 Algorithms and Programming (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp03-25-rp-algorytmizacziya-ta-programuvannya.pdf\">Work program<\/a>)<\/li><li>OZP.05 English for Professional Purposes (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp_05_fit_kbzi_1_kurs_2025_baza.pdf\">Work program<\/a>)<\/li><li>OZP.06 Probability Theory and Mathematical Statistics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp06-25-rp-teoriya-jmovirnosti-ta-matematychna-statystyka.pdf\">Work program<\/a>)<\/li><li>OZP.07 Physics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp07-25-rp-fizyka.pdf\">Work program<\/a>) <\/li><li>OFP.01 Basics of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp01-25-rp-osnovy-informaczijnoyi-bezpeky.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>2nd year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-6 wp-block-columns\">\n<div class=\"wp-container-4 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>3rd semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.08.1 Basic general military training (theoretical training) (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp.08.01-rp-bazova-zagalnovijskova-pidgotovka-teoretychna-pidgotovka.pdf\">Work program<\/a>)<\/li><li>OZP.08.2 Fundamentals of patriotic and psychological training and first aid (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp.08.02-rp-osnovy-patriotychnoyi-psyhologichnoyi-pidgotovky-ta-pershoyi-domedychnoyi-dopomogy.pdf\">Work program<\/a>)<\/li><li>OFP.02 Mathematical Foundations of Information Security (Work program)<\/li><li>OFP.03 Information theory and coding (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp03-25-rp-teoriya-informacziyi-ta-koduvannya.pdf\">Work program<\/a>)<\/li><li>OFP.04 Signals and processes in information security systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp04-25-rp-sygnaly-i-proczesy.pdf\">Work program<\/a>)<\/li><li>OFP.05 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2025_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-5 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>4th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.09 Civil Society, Economy, and Governance (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp09-25-rp-gromadyanske-suspilstvo-ekonomika-ta-upravlinnya.pdf\">Work program<\/a>)<\/li><li>OFP.02 Mathematical Foundations of Information Security (Work program)<\/li><li>OFP.05 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2025_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><li>OFP.06 Information Security in Information and Communication Systems (course project) (Methodological guidelines)<\/li><li>OFP.07 Steganography and Steganalysis (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp07-25-rp-steganografiya-i-steganoanaliz.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>3rd year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-9 wp-block-columns\">\n<div class=\"wp-container-7 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>5th semester<\/strong><\/p>\n\n\n\n<ul><li>\u041e\u0417\u041f.10 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0436\u0438\u0442\u0442\u0454\u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456, \u043e\u0445\u043e\u0440\u043e\u043d\u0430 \u043f\u0440\u0430\u0446\u0456, \u0446\u0438\u0432\u0456\u043b\u044c\u043d\u0438\u0439 \u0437\u0430\u0445\u0438\u0441\u0442 \u0442\u0430 \u0435\u043a\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ozp10-25-rp-bezpeka-zhyttyediyalnosti-ohorona-praczi-czyvilnyj-zahyst-ta-ekologichna-bezpeka.pdf\">Work program<\/a>)<\/li><li>OFP.05 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2025_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><li>OFP. 08 Regulatory and legal support of cybersecurity (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp08-25-rp-normatyvno-pravove-zabezpechennya-kiberbezpeky.pdf\">Work program<\/a>) <\/li><li>OFP.09 Applied cryptology (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp09-25-rp-prykladna-kryptologiya.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-8 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>6th semester<\/strong><\/p>\n\n\n\n<ul><li>OFP.09 Applied cryptology (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp09-25-rp-prykladna-kryptologiya.pdf\">Work program<\/a>)<\/li><li>OFP. 10 Administration and protection of databases and data warehouses (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp10-25-rptyt-administruvannya-ta-zahyst-baz-i-shovyshh-danyh.pdf\">Work program<\/a>)<\/li><li>OFP.11 Administration and protection of databases and data storage facilities (course project) (Methodological guidelines)<\/li><li>OFP.12 Comprehensive Information Protection Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp12-25-rp-kszi.pdf\" title=\"\">Work program<\/a>)<\/li><li>OFP.15 Industrial practice 1 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp15-25-rp-vyrobnycha-praktyka-1.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>4th year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-12 wp-block-columns\">\n<div class=\"wp-container-10 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>7th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.11 Philosophy (Work Program)<\/li><li>OFP.12 Comprehensive Information Protection Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp12-25-rp-kszi.pdf\" title=\"\">Work program<\/a>)<\/li><li>OFP. 13 Vulnerability and intrusion detection technologies (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp13-25-rp-tehnologiyi-vyyavlennya-vrazlyvostej-ta-vtorgnen.pdf\">Work program<\/a>) <\/li><li>OPP.14 Management of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp14-25-rp-upravlinnya-informaczijnoyu-bezpekoyu.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-11 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>8th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.12 Cultural Studies, Speech Culture, Ethics, and Aesthetics (Work Program)<\/li><li>OFP.12 Comprehensive Information Protection Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp12-25-rp-kszi.pdf\" title=\"\">Work program<\/a>) <\/li><li>OPP.14 Management of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp14-25-rp-upravlinnya-informaczijnoyu-bezpekoyu.pdf\">Work program<\/a>)<\/li><li>OFP.16 Industrial practice 2 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib25-ofp16-25-rp-vyrobnycha-praktyka-2.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-tabs-child uagb-tabs__body-container uagb-inner-tab-1\" aria-labelledby=\"uagb-tabs__tab1\">\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Educational programs<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/op\/b\/125-kzi-2023.pdf\">Educational and professional program \u201cCybersecurity and Information Protection\u201d. 2023<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/proekty-op\/b\/125-kzi-2023.pdf\">Project of the educational and professional program \"Cybersecurity and Information Protection.\" 2023<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/proekty-op\/b\/125-kzi-2023-obg.pdf\">Table of proposals for the draft educational and professional program \"Cybersecurity and Information Protection.\" 2023<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Curriculum<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/125_kb_2023-np_bak-zi-zminamy-2025r.pdf\">\u041d\u0430\u0432\u0447\u0430\u043b\u044c\u043d\u0438\u0439 \u043f\u043b\u0430\u043d (\u0437\u0456 \u0437\u043c\u0456\u043d\u0430\u043c\u0438). \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u0442\u0430 \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. 2023. \u0414\u0435\u043d\u043d\u0430 \u0444\u043e\u0440\u043c\u0430 \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u043f\u043e\u0432\u043d\u043e\u0457 \u0437\u0430\u0433\u0430\u043b\u044c\u043d\u043e\u0457 \u0441\u0435\u0440\u0435\u0434\u043d\u044c\u043e\u0457 \u043e\u0441\u0432\u0456\u0442\u0438<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/125_kb_2023-np_bak.pdf\">Curriculum. Cybersecurity and Information Protection. 2023. Full-time education based on complete secondary education.<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong><strong>Reviews of educational programs<\/strong><\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/recz-hmelnyczkinfokom.pdf\">Khmelnitskinfocom Limited Liability Company<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/recz-kiberpolicziya.pdf\">Department for Combating Cybercrime in Khmelnytskyi Region of the Cyber Police Department of the National Police of Ukraine<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Work programs<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>1st year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-15 wp-block-columns\">\n<div class=\"wp-container-13 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>1st semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.01 Higher Mathematics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.01-vyshha-matematyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.01-2024-vyshha-matematyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OZP.02 Discrete Mathematics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.02-dyskretna-matematyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.02-2024-dyskretna-matematyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OZP.03 Algorithms and Programming (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.03-algorytmizacziya-ta-programuvannya.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.03-2024-algorytmizacziya-ta-programuvannya.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OZP.04 Physical Education and Health Basics (Syllabus, Work Program)<\/li><li>OZP.05 English for Professional Purposes (Syllabus, <a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-ozp05-24-rp-anglijska-mova-za-profesijnym-spryamuvannyam.pdf\">Work program<\/a>)<\/li><li>OPP.01 Fundamentals of Information Security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.01-osnovy-informaczijnoyi-bezpeky.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.01-2023-osnovy-informaczijnoyi-bezpeky.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-14 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>2nd semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.03 Algorithms and Programming (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.03-algorytmizacziya-ta-programuvannya.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.03-2024-algorytmizacziya-ta-programuvannya.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OZP.05 English for Professional Purposes (Syllabus, <a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-ozp05-24-rp-anglijska-mova-za-profesijnym-spryamuvannyam.pdf\">Work program<\/a>)<\/li><li>OZP.06 Probability Theory and Mathematical Statistics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.06-teoriya-jmovirnosti-ta-matematychna-statystyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.06-2024-teorij-jmovirnosti-ta-matematychna-statystyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OZP.07 Physics (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.07-fizyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/ozp.07-2024-fizyka.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OPP.02 Operating systems and technologies for their protection (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.02-operaczijni-systemy-ta-tehnologiyi-yih-zahystu.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.02-2023-operaczijni-systemy-ta-tehnologiyi-yih-zahystu.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>) <\/li><li>OPP.03 Mathematical Foundations of Information Security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.03.-matematychni-osnovy-zahystu-informacziyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.03-2024-matematychni-osnovy-zahystu-informacziyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>2nd year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-18 wp-block-columns\">\n<div class=\"wp-container-16 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>3rd semester<\/strong><\/p>\n\n\n\n<ul><li>OPP.03 Mathematical Foundations of Information Security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp03-25-rp-matematychni-osnovy-zahystu-informacziyi.pdf\">Work program<\/a>)<\/li><li>OPP.04 Information Theory and Coding (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp04-25-rp-teoriya-informacziyi-ta-koduvannya.pdf\">Work program<\/a>)<\/li><li>OPP.05 Signals and processes in information security systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp05-25-rp-sygnaly-i-proczesy.pdf\">Work program<\/a>)<\/li><li>OPP.06 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2023_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><li>Basic general military training (theoretical training) (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-rp-bazova-zagalnovijskova-pidgotovka-teoretychna-pidgotovka.pdf\">Work program<\/a>)<\/li><li>Fundamentals of patriotic and psychological training and first aid (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-rp-osnovy-patriotychnoyi-psyhologichnoyi-pidgotovky-ta-pershoyi-domedychnoyi-dopomogy.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-17 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>4th semester<\/strong><\/p>\n\n\n\n<ul><li>OPP.06 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2023_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><li>OPP.07 Web resource security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp07-25-rp-bezpeka_vebresursiv.pdf\">Work program<\/a>)<\/li><li>OPP.08 Component base and circuitry of protection systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp08-25-rp-komponentna-baza-i-shemotehnika-system-zahystu.pdf\">Work program<\/a>) <\/li><li>OPP.09 Applied Cryptology (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp09-25-rp-prykladna-kryptologiya.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>3rd year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-21 wp-block-columns\">\n<div class=\"wp-container-19 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>5th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.07 Civil society, economy and governance<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-ozp08-25-rp-gromadyanske-suspilstvo-ekonomika-ta-upravlinn.pdf\">Work program<\/a>)<\/li><li>OPP.06 Information Security in Information and Communication Systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/rp_opp_2023_ziks_2025-2026_na-sajt.pdf\" title=\"\">Work program<\/a>)<\/li><li>OPP.09 Applied Cryptology (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp09-25-rp-prykladna-kryptologiya.pdf\">Work program<\/a>) <\/li><li>OPP. 10 Regulatory and legal support of cybersecurity (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp10-25-rp-normatyvno-pravove-zabezpechennya-kiberbezpeky.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-20 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>6th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.09 Cultural Studies, Speech Culture, Ethics, and Aesthetics (Work Program)<\/li><li>OPP.11 Administration and protection of databases and data repositories (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp11-25-rp-administruvannya-ta-zahyst-baz-i-shovyshh-danyh.pdf\">Work program<\/a>)<\/li><li>OPP.14 Comprehensive information protection systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp14-25-rp-kszi.pdf\" title=\"\">Work program<\/a>)<\/li><li>OPP.15 Industrial practice 1 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp15-25-rp-vyrobnycha-praktyka-1.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>4th year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-24 wp-block-columns\">\n<div class=\"wp-container-22 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>7th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.10 Philosophy (Work Program)<\/li><li>OPP.12 Vulnerability and intrusion detection technologies (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp12-25-rp-tehnologiyi-vyyavlennya-vrazlyvostej-ta-vtorgnen.pdf\">Work program<\/a>)<\/li><li>OPP.13 Management of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp13-25-rp-upravlinnya-informaczijnoyu-bezpekoyu.pdf\">Work program<\/a>) <\/li><li>OPP.14 Comprehensive information protection systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp14-25-rp-kszi.pdf\" title=\"\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-23 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>8th semester<\/strong><\/p>\n\n\n\n<ul><li>OPP.11 Health and safety, labor protection, civil protection and environmental safety (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-ozp11-25-rp-bezpeka-zhyttyediyalnosti-ohorona-praczi-czyvilnyj-zahyst-ta-ekologichna-bezpeka.pdf\">Work program<\/a>)<\/li><li>OPP.13 Management of information security (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp13-25-rp-upravlinnya-informaczijnoyu-bezpekoyu.pdf\">Work program<\/a>) <\/li><li>OPP.14 Comprehensive information protection systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp14-25-rp-kszi.pdf\" title=\"\">Work program<\/a>)<\/li><li>OPP.16 Industrial practice 2 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbzib23-opp16-25-rp-vyrobnycha-praktyka-2.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-tabs-child uagb-tabs__body-container uagb-inner-tab-2\" aria-labelledby=\"uagb-tabs__tab2\">\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Educational programs<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/op\/b\/125-kb-2022.pdf\">Educational and professional program \u201cCybersecurity\u201d. 2022<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/proekty-op\/b\/125-kb-2022.pdf\">Project of the educational and professional program \"Cybersecurity.\" 2022<\/a><\/li><li><a href=\"https:\/\/khmnu.edu.ua\/wp-content\/uploads\/proekty-op\/b\/125-kb-2022-obg.pdf\">Table of proposals for the draft educational and professional program \"Cybersecurity.\" 2022<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Curriculum<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/125-kb-navchalnyj-plan-bakalavry-2022.pdf\">Curriculum. Cybersecurity. 2022. Full-time education based on complete secondary education.<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong><strong>Reviews of educational programs<\/strong><\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-ukrgazbank.pdf\">UKRGASBANK<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-pryvatbank.pdf\">PrivatBank<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-dp-novator.pdf\">State enterprise \u201cNovator\u201d of the state concern \u201cUkroboronprom\u201d<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-dtn-s.-lyenkov.pdf\">Taras Shevchenko National University of Kyiv<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-yaczkiv.pdf\">Ternopil National Economic University<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-hmelnyczkinfokom.pdf\">Khmelnitskinfocom Limited Liability Company<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-yevseyev.pdf\">Semen Kuznets Kharkiv National University of Economics<\/a><\/li><li><a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/reczenziya-oshhadbank-starokostyantyniv.pdf\">Territorial Separate Unbalanced Branch No. 10022\/094 of the Khmelnytsky Regional Branch of the Joint Stock Company \u201cOschadbank\u201d<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-neve-link-hover-color-color has-text-color has-medium-font-size\"><strong>Work programs<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>3rd year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-27 wp-block-columns\">\n<div class=\"wp-container-25 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>5th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.08 Civil Society, Economy, and Governance (Syllabus, Work Program)<\/li><li>OPP. 10 Regulatory and legal support of cybersecurity (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.10-normatyvno-pravove-zabezpechennya-kiberbezpeky.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.10-2023-normatyvno-pravove-zabezpechennya-kiberbezpeky.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><li>OPP.11 Security of wireless technologies and the Internet of Things (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.11-bezpeka-bezdrotovyh-tehnologij-ta-internetu-rechej.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.11-2023-bezpeka-bezdrotovyh-tehnologij-ta-internetu-rechej.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>) <\/li><li>OPP.12 Administration and protection of databases and data repositories (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.12-administruvannya-ta-zahyst-baz-i-shovyshh-baz-danyh.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.12-2024-administruvannya-ta-zahyst-baz-i-shovyshh-danyh.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-26 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>6th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.09 Cultural Studies, Speech Culture, Ethics, and Aesthetics (Syllabus, Work Program)<\/li><li>OPP. 13 Access control systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.13-systemy-kontrolyu-dostupu.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.13-2023-systemy-kontrolyu-dostupu.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>) <\/li><li>OPP.14 Vulnerability and intrusion detection technologies (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.14-tehnologiyi-vyyavlennya-vrazlyvostej-ta-vtorgnen.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Syllabus<\/a>,&nbsp;<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/opp.14-2023-tehnologiyi-vyyavlennya-vrazlyvostej-ta-vtorgnen-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>4th year<\/strong><\/p>\n\n\n\n<div class=\"wp-container-30 wp-block-columns\">\n<div class=\"wp-container-28 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>7th semester<\/strong><\/p>\n\n\n\n<ul><li>OZP.10 Philosophy (Work Program)<\/li><li>OPP.15 Data protection modelling, risk assessment and decision-making (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbb22-opp15-25-rp-modelyuvannya-system-zahystu-danyh-oczinka-ryzykiv-i-pryjnyattya-rishen.pdf\">Work program<\/a>)<\/li><li>OPP.16 Comprehensive information protection systems (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbb22-opp16-25-rp-kompleksni-systemy-zahystu.pdf\">Work program<\/a>)<\/li><li>OPP.17 Management of information security<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbb22-opp17-25-rp-upravlinnya-informaczijnoyu-bezpekoyu.pdf\">Work program<\/a>)<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-container-29 wp-block-column\">\n<p class=\"has-text-align-center\"><strong>8th semester<\/strong><\/p>\n\n\n\n<ul><li>OPP.11 Health and safety, labor protection, civil protection and environmental safety (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbb22-ozp11-25-rp-bezpeka-zhyttyediyalnosti-ohorona-praczi-czyvilnyj-zahyst-ta-ekologichna-bezpeka.pdf\">Work program<\/a>)<\/li><li>\u041e\u041f\u041f. 19 \u041f\u0435\u0440\u0435\u0434\u0434\u0438\u043f\u043b\u043e\u043c\u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430 (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kbb22-opp19-25-rp-pereddyplomna-praktyka.pdf\">Work program<\/a>)<\/li><li>OPP.20 Qualification work (<a href=\"https:\/\/kb.khmnu.edu.ua\/wp-content\/uploads\/sites\/6\/kb22-opp20-metodvkazivky-kvalifikaczijna-robota.pdf\">Methodological guidelines<\/a>)<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<div class='heateorSssClear'><\/div><div  class='heateor_sss_sharing_container heateor_sss_horizontal_sharing' data-heateor-sss-href='https:\/\/kb.khmnu.edu.ua\/en\/bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi\/'><div class='heateor_sss_sharing_title' style=\"font-weight:bold\" ><\/div><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a target=\"_blank\" aria-label=\"Facebook Messenger\" class=\"heateor_sss_button_facebook_messenger\" href=\"https:\/\/www.facebook.com\/dialog\/send?app_id=1904103319867886&display=popup&link=https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F&redirect_uri=https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_facebook_messenger\" style=\"background-color:#0084ff;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-2 -2 36 36\"><path fill=\"#fff\" d=\"M16 5C9.986 5 5.11 9.56 5.11 15.182c0 3.2 1.58 6.054 4.046 7.92V27l3.716-2.06c.99.276 2.04.425 3.128.425 6.014 0 10.89-4.56 10.89-10.183S22.013 5 16 5zm1.147 13.655L14.33 15.73l-5.423 3 5.946-6.31 2.816 2.925 5.42-3-5.946 6.31z\"\/><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%D0%91%D0%B0%D0%BA%D0%B0%D0%BB%D0%B0%D0%B2%D1%80%D0%B0%D1%82&url=https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Viber\" class=\"heateor_sss_button_viber\" href=\"viber:\/\/forward?text=%D0%91%D0%B0%D0%BA%D0%B0%D0%BB%D0%B0%D0%B2%D1%80%D0%B0%D1%82%20https%3A%2F%2Fkb.khmnu.edu.ua%2Fen%2Fbakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi%2F\" title=\"Viber\" rel=\"nofollow noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_viber\" style=\"background-color:#8b628f;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M22.57 27.22a7.39 7.39 0 0 1-1.14-.32 29 29 0 0 1-16-16.12c-1-2.55 0-4.7 2.66-5.58a2 2 0 0 1 1.39 0c1.12.41 3.94 4.3 4 5.46a2 2 0 0 1-1.16 1.78 2 2 0 0 0-.66 2.84A10.3 10.3 0 0 0 17 20.55a1.67 1.67 0 0 0 2.35-.55c1.07-1.62 2.38-1.54 3.82-.54.72.51 1.45 1 2.14 1.55.93.75 2.1 1.37 1.55 2.94a5.21 5.21 0 0 1-4.29 3.27zM17.06 4.79A10.42 10.42 0 0 1 26.79 15c0 .51.18 1.27-.58 1.25s-.54-.78-.6-1.29c-.7-5.52-3.23-8.13-8.71-9-.45-.07-1.15 0-1.11-.57.05-.87.87-.54 1.27-.6z\" fill=\"#fff\" fill-rule=\"evenodd\"><\/path><path d=\"M24.09 14.06c-.05.38.17 1-.45 1.13-.83.13-.67-.64-.75-1.13-.56-3.36-1.74-4.59-5.12-5.35-.5-.11-1.27 0-1.15-.8s.82-.48 1.35-.42a6.9 6.9 0 0 1 6.12 6.57z\" fill=\"#fff\" fill-rule=\"evenodd\"><\/path><path d=\"M21.52 13.45c0 .43 0 .87-.53.93s-.6-.26-.64-.64a2.47 2.47 0 0 0-2.26-2.43c-.42-.07-.82-.2-.63-.76.13-.38.47-.41.83-.42a3.66 3.66 0 0 1 3.23 3.32z\" fill=\"#fff\" fill-rule=\"evenodd\"><\/path><\/svg><\/span><\/a><a aria-label=\"Copy Link\" class=\"heateor_sss_button_copy_link\" title=\"Copy Link\" rel=\"noopener\" href=\"https:\/\/kb.khmnu.edu.ua\/en\/bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi\/\" onclick=\"event.preventDefault()\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_copy_link\" style=\"background-color:#ffc112;width:40px;height:40px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 40 40\"><path fill=\"#fff\" d=\"M24.412 21.177c0-.36-.126-.665-.377-.917l-2.804-2.804a1.235 1.235 0 0 0-.913-.378c-.377 0-.7.144-.97.43.026.028.11.11.255.25.144.14.24.236.29.29s.117.14.2.256c.087.117.146.232.177.344.03.112.046.236.046.37 0 .36-.126.666-.377.918a1.25 1.25 0 0 1-.918.377 1.4 1.4 0 0 1-.373-.047 1.062 1.062 0 0 1-.345-.175 2.268 2.268 0 0 1-.256-.2 6.815 6.815 0 0 1-.29-.29c-.14-.142-.223-.23-.25-.254-.297.28-.445.607-.445.984 0 .36.126.664.377.916l2.778 2.79c.243.243.548.364.917.364.36 0 .665-.118.917-.35l1.982-1.97c.252-.25.378-.55.378-.9zm-9.477-9.504c0-.36-.126-.665-.377-.917l-2.777-2.79a1.235 1.235 0 0 0-.913-.378c-.35 0-.656.12-.917.364L7.967 9.92c-.254.252-.38.553-.38.903 0 .36.126.665.38.917l2.802 2.804c.242.243.547.364.916.364.377 0 .7-.14.97-.418-.026-.027-.11-.11-.255-.25s-.24-.235-.29-.29a2.675 2.675 0 0 1-.2-.255 1.052 1.052 0 0 1-.176-.344 1.396 1.396 0 0 1-.047-.37c0-.36.126-.662.377-.914.252-.252.557-.377.917-.377.136 0 .26.015.37.046.114.03.23.09.346.175.117.085.202.153.256.2.054.05.15.148.29.29.14.146.222.23.25.258.294-.278.442-.606.442-.983zM27 21.177c0 1.078-.382 1.99-1.146 2.736l-1.982 1.968c-.745.75-1.658 1.12-2.736 1.12-1.087 0-2.004-.38-2.75-1.143l-2.777-2.79c-.75-.747-1.12-1.66-1.12-2.737 0-1.106.392-2.046 1.183-2.818l-1.186-1.185c-.774.79-1.708 1.186-2.805 1.186-1.078 0-1.995-.376-2.75-1.13l-2.803-2.81C5.377 12.82 5 11.903 5 10.826c0-1.08.382-1.993 1.146-2.738L8.128 6.12C8.873 5.372 9.785 5 10.864 5c1.087 0 2.004.382 2.75 1.146l2.777 2.79c.75.747 1.12 1.66 1.12 2.737 0 1.105-.392 2.045-1.183 2.817l1.186 1.186c.774-.79 1.708-1.186 2.805-1.186 1.078 0 1.995.377 2.75 1.132l2.804 2.804c.754.755 1.13 1.672 1.13 2.75z\"\/><\/svg><\/span><\/a><a class=\"heateor_sss_more\" aria-label=\"More\" title=\"More\" rel=\"nofollow noopener\" style=\"font-size: 32px!important;border:0;box-shadow:none;display:inline-block!important;font-size:16px;padding:0 4px;vertical-align: middle;display:inline;\" href=\"https:\/\/kb.khmnu.edu.ua\/en\/bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi\/\" onclick=\"event.preventDefault()\"><span class=\"heateor_sss_svg\" style=\"background-color:#ee8e2d;width:40px;height:40px;border-radius:999px;display:inline-block!important;opacity:1;float:left;font-size:32px!important;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;display:inline;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box;\" onclick=\"heateorSssMoreSharingPopup(this, 'https:\/\/kb.khmnu.edu.ua\/en\/bakalavr-op-f5-kiberbezpeka-ta-zahyst-informacziyi\/', '%D0%91%D0%B0%D0%BA%D0%B0%D0%BB%D0%B0%D0%B2%D1%80%D0%B0%D1%82', '' )\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewbox=\"-.3 0 32 32\" version=\"1.1\" width=\"100%\" height=\"100%\" style=\"display:block;border-radius:999px;\" xml:space=\"preserve\"><g><path fill=\"#fff\" d=\"M18 14V8h-4v6H8v4h6v6h4v-6h6v-4h-6z\" fill-rule=\"evenodd\"><\/path><\/g><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div><div class='heateorSssClear'><\/div>","protected":false},"author":64,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false,"qubely_landscape":false,"qubely_portrait":false,"qubely_thumbnail":false,"neve-blog":false},"uagb_author_info":{"display_name":"losangeles","author_link":"https:\/\/kb.khmnu.edu.ua\/en\/author\/losangeles\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/pages\/5175"}],"collection":[{"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/comments?post=5175"}],"version-history":[{"count":39,"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/pages\/5175\/revisions"}],"predecessor-version":[{"id":5878,"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/pages\/5175\/revisions\/5878"}],"wp:attachment":[{"href":"https:\/\/kb.khmnu.edu.ua\/en\/wp-json\/wp\/v2\/media?parent=5175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}