. "Security And Privacy"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Cybersecurity and law"@en . . "3" . "The course develops basic orientation of the students in \r\nthe legal instruments of securing protection against cybercrime by providing knowledge of the \r\nenforced criminal and administrative legislation and its implementation, as well as practical \r\nknowledge and skills to recognize, investigate and prevent cybercrime. The course provides \r\nknowledge in the field of types of cybercrime, modus operandi, criminal consequences, \r\nperpetrator’s profile, crime discovery and proving. The training methodology includes interactive \r\nlectures, role-plays, practical tasks and simulations. It also envisages the participation of practicing \r\njudges, prosecutors and special-unit investigators in the seminars, conducting of topic-based \r\nseminar exercises, case-solving, visits and internship in the judiciary, prosecution and law\u0002enforcement institutions, incl. General Directorate ‘Fight against Organized Crime’ and Interpol. \r\nThe knowledge and skill which are expected to be developed by the students establish conditions \r\nfor their high-competitive professional realization in the sectors of criminal justice, state \r\nadministration, international relations, national security, and businesses\n\nOutcome:\nAfter the course has been accomplished the \r\nacquired knowledge and skills include:\r\n- free professional usage of penal-law terminology and familiarity with the special preventive \r\nand regulative legislation and its terminology;\r\n- ability to recognize types of cybercrime related to abuse of or impact against information \r\nsystems, technology, or data, modus operandi and tools for their perpetration, typical crime \r\nschemes, motivation mechanism, perpetrator’s profile;\r\n- differentiation of criminal from non-criminal conduct;\r\n- ability to undertake measures within students’ main professional domain to prevent \r\ncybercrime in the area of their professional activities;\r\n- well-integrated basic knowledge of cybercrime discovery and investigation and the ole of the \r\ncourt-expertise and court experts in the evidence-gathering process, including innovative \r\napproaches and techniques in the area;\r\n- basic personal experience in the recognition of a cybercrime, its detection, investigation and \r\nestablishing, court-expert’s counteraction with investigation and judiciary authorities, \r\nincluding team-work and performing under role-distribution." . . "Presential"@en . "TRUE" . . "Master of Big Data Analytics"@en . . "https://www.tu-sofia.bg/specialties/preview/863 https://www.tu-sofia.bg/uplanEn/FAMI/Master/UPlan_M_BDA_2020_EN.pdf" . "60"^^ . "Presential"@en . "The Master's Degree focuses on training related to the development of software for Big Data Analysis on Social Networks, Big Data Ecosystem Security, Digital Big Data and Computer Forensics and Intelligent Personalized Medicine Systems. The specialized disciplines are related to the most up-to-date areas of software science and informatics (cloud platforms and services, big data analysis, knowledge extraction, decision making). The practical orientation of the training is related to the development of coursework in compulsory disciplines and individual software projects in selected disciplines. A diploma thesis is being developed during the last academic semester. Graduates in the specialty “Analysis of Large Arrays and Data Flows” receive a Master's Degree in Computer Science, Big Data Analyst."@en . . . "1"@en . "FALSE" . . . "Master"@en . "Thesis" . "1000.00" . "Bulgarian Lev"@en . "7036.5" . "Recommended" . "The specialty “Big Data Analytics” is among the 5 with highest income for graduates according to the rating system of higher schools.\r\n\r\nThey could find work as:\r\n\r\n1. analyzers and software specialists in scientific institutes, organizations and companies, using contemporary information technologies;\r\n2. analyzers in software companies;\r\n3. analyzers in state administration, in the development of e-management;\r\n4. in financial and insurance institutions;\r\n5. university lecturers and research workers."@en . "1"^^ . "FALSE" . "Midstream"@en . . . . . . . . . . . . . . . . . . . .