| 1 |
Has sufficient knowledge of mathematics in the field of information security and the ability to use theoretical and applied knowledge in this field in solving complex data science problems. |
|
|
X |
|
| 2 |
Can analyze and interpret the information obtained with the ability to conduct scientific research in depth. |
|
X |
|
|
| 3 |
Competence in the design and implementation of analytical, modeling and experimental research; has the ability to analyze and interpret complex cyber attacks |
|
|
|
X |
| 4 |
Has the ability to work with systems that have vulnerabilities and can mitigate vulnerabilities by integrating information from various sources |
|
|
X |
|
| 5 |
Has the necessary programming skills to identify and solve information security problems |
|
X |
|
|
| 6 |
Has the ability to lead multidisciplinary teams, develop solution strategies for complex problems, take responsibility and contribute to team work. |
X |
|
|
|
| 7 |
Ability to develop innovative ideas and methods; Has the ability to introduce new approaches in vulnerability detection and defense processes in the field of information security |
|
|
X |
|
| 8 |
Competent in defining, accessing and evaluating the required data and information, data management and analytics. |
|
|
|
X |
| 9 |
Can follow current developments in the field of information security, learn and adapt new technologies quickly |
|
|
|
X |
| 10 |
Can effectively convey the results of work done and present technical and complex topics in an understandable way |
|
X |
|
|
| 11 |
Is aware of the social and environmental impacts of information security practices and can adapt in this context |
|
|
X |
|
| 12 |
Has knowledge of social, scientific, and ethical values in the processes of cyberattack detection, prevention, and reporting; observes ethical principles and prioritizes the benefit of society |
|
X |
|
|