A shared academic foundation. These required modules build essential skills for long-term growth in your field.
Must Take
Introduction
Start your journey with a bootcamp-style course that brings students from every programme together. Learn the fundamentals of Harbour.Space’s hands-on model, meet your peers, and get ready to collaborate across disciplines.
From Zero to Hero
The course represents a deep dive into concepts and frameworks introduced during orientation. It is designed to teach students the process of creating a new venture. It introduces its participants to the concepts, challenges, and tools needed to create a successful new venture. Business model design & validation frameworks are studied and applied to the teams’ startups.
Must Take All
Major Core
These modules form the backbone of your education. They are designed to help you think critically, solve complex problems, and build the deep technical or strategic skills required for your discipline.
IT Technology Essentials
The course serves as a technology bootcamp giving students quick introduction to technologies foundational to cybersecurity programme including programming, operating systems, networks and application development.
Enterprise Security Architecture
The course examines the main aspects of building an Information Security Management System of modern Enterprises. The course focuses on eight major security domains, ranging from Risk Management to Software Development Security in the context of three areas - People, Process and Technologies. We analyze the main risks and threats Enterprise Cybersecurity and risk mitigation using predictive, preventive, detective and corrective security controls. An overview of modern security toolkit beginning from Next Generation Firewalls and Antiviruses and finishing with publishing SandBox and User Behavior Analytics will be presented.
Security Assessment, Penetration Testing and Audit
This course provides essential information about cybersecurity assessment of information systems and applications. Different approaches, such as compliance audit and certification, penetration testing and Red Team exercises will be discussed. You will learn practical cases of compliance assessment according international standards such as ISO/IEC 15408, ISO/IEC 27002, PCI DSS, PA DSS. The course is full of practical methods. It provides spacious coverage of tools and techniques that are used in penetration testing and ethical hacking.
Malware Analysis, Digital Forensic and Incident Response
This course will fully introduce attendees to incident response and digital forensics. The hands-on, practice-oriented format of this course will allow students to obtain the required skills to conduct the cycle of detection, response and analysis of compromised systems, in both live and postmortem situations, with best practices to discover different cyber attacks. We will study various tools to perform evidence collection and live analysis, and go through different techniques to analyse volatile and nonvolatile data. We will learn what approaches and tools can be used and how to perform static and dynamic analysis of malicious executables for multiple platforms – Windows, Linux, MacOS and Android. Vulnerabilities and exploits analysis, reverse engineering byte-code and script languages, automating reverse engineering tasks, unpacking, deobfuscating and dynamic binary instrumentation will be dicussed.
Security Operations Center and Cyber Threat Hunting
Information security is a complex of processes, people and technologies, and their mutual effectiveness defines efficiency of overall Infosecurity program in the enterprise. Security operations is the crucial glue between these three components and Security operations center is its implementation in practice. During the module classes students get acquainted with modern attack tactics, techniques and procedures and how they can be addressed by security operations staff. In lab classes students will get practical skills in attack detection and investigation.
Artificial Intelligence Security
The course covers different aspects of cybersecurity and cyber resilience of systems and applications based on Artificial Intelligence and Machine Learning. We will learn cybersecurity of AI in various aspects: from threat modelling and requirements development to vulnerability research and practical attacks against AI models such as Adversarial ML, Model Backdooring etc.
Choose 1
Capstone Project
The Capstone Project is the culmination of the Cybersecurity program, where you address a real-world security challenge. Working individually or in teams, you will design, implement, and evaluate a comprehensive cybersecurity solution, whether that involves developing secure systems, conducting penetration tests, performing forensic analysis, or assessing organizational risks. Your capstone emphasizes technical proficiency, critical thinking, and ethical responsibility.
Client Work
Work on a real-world project for an external client. This capstone option provides hands-on experience collaborating with industry partners, managing client expectations, and delivering professional solutions to real business challenges.
Thesis
Conduct original research in your field of study and produce a formal thesis. This capstone option is ideal for students interested in pursuing further academic research or diving deep into a specific topic of interest with scholarly rigor.
Startup
Launch your own startup as your capstone project. From ideation to MVP development, you will work through the entire startup lifecycle, applying entrepreneurial principles, product development, and go-to-market strategies learned throughout the program.
Independent Project
Design and execute your own independent project, driven by your unique interests and career goals. This capstone option offers maximum flexibility to explore innovative ideas, conduct research, or develop solutions that reflect your personal vision and professional aspirations.
Choose from a rotating selection of specialised topics to deepen your interests. Availability may vary year to year.
Choose at least 4
Major Electives
Go deeper into your discipline by choosing electives that align with your personal and professional goals. These courses offer advanced knowledge and flexible focus areas.
Cyber Governance, Risk and Compliance
Cybersecurity management is the management of risk, specifically the risks to information assets assessed by an organization. This course explores the role of governance, risk management, and compliance (GRC) as part of the cybersecurity governance process, including key planning, policy, and technology administration functions to support the protection of critical information assets. The course will give you an insight into current laws and regulations such as GDPR, ISO / IEC 27002, PCI DSS, CIIP, HIPPA. Understanding the basics of implementing a risk management strategy will help manage policies, create controls, and measure the effectiveness of controls. In this course, you will learn how to customize processes to ensure compliance with the norms of behavior in your organization, including risk analysis, ensuring a systematic culture of documentation, review, audits, remediation, control, accountability and authority.
Critical Information Infrastructure Cyber Resilience
The module covers various aspects of cybersecurity and cyber resilience of mobile and telecommunication networks, financial institutions and industrial systems. During this course we will learn cybersecurity in various aspects: from analyzing risks and the requirements of international and industry standards to vulnerability research in incident response in ICS/SCADA, ATM and SS7 telecom networks.
Modern Cryptography
The course is dedicated to all the most relevant topics of modern cryptography. It covers the full spectre of security notions and corresponding adversary models that define the theoretical and practical properties of cryptographic mechanisms that are currently used. All widely used primitives, algorithms and protocols are observed in the course - together with reviewing of their vulnerabilities, theoretical and practical attacks and most important results of security assessment. The two most important protocols - IPsec and TLS - are deeply studied, together with the history of attacks and countermeasures against them. The final part of the course is dedicated to the problems of practical applications of cryptography, including the most discussed topics, such as blockchain technologies, IoT, backdoors and security of implementations (HSMs, smart cards and tokens, digital signature servers).
Datacenter and Cloud Security
The module covers various aspects of cybersecurity and cyber resilience of modern Data Centres, Cloud and Big Data Platforms. During this course we will learn cybersecurity in various aspects: from analysing risks and the requirements of international and industry standards to vulnerability research and practical attacks against cloud applications.
Secure Software Development
In today’s world, where development becomes faster, and companies are rushing their products to the market, it is crucial to apply security practices as early as possible. Software developers must understand security concepts, and cybersecurity engineers should adjust their practices to agile environments. The course covers the modern approach to secure coding from both the development and security point of view.
Security Program Management, Social Engineering and Security Awareness
Security goals cannot be addressed by technical means alone. Significant aspect of protection comes down to the awareness, behaviour and capabilities of the people involved. In this course we will discuss different aspects of information security culture such as user acceptance of security policies and technologies, usable security, social engineering and other human-related risks to help to prepare and execute efficient cybersecurity program.
Mobile & Wireless Network Security
The aim of the course is a deep immersion in various aspects of the security of modern mobile technologies. The course consists of two main parts. The first part focuses on mobile communications, from WiFi and Bluetooth to the telecommunications networks of 4G and 5G carriers. Vulnerabilities of systems and protocols and their possible impact on systems using mobile networks are discussed in detail. The second part focuses on the security of mobile devices such as mobile phones, IoT devices, etc. The security model of Android and iOS operating systems and approaches to secure application development will be considered.
Hardware Security
Hardware is an essential part of modern IT technology. The course examines how defense mechanisms are implemented at the hardware level. The main approaches to the design of secure systems and the main approaches to the analysis of the security of equipment will be considered. Special attention will be paid to various IoT devices and their security.
Host Security Hardening
The course is aimed at a detailed analysis of the security system of operating systems of the Windows and Linux families. It covers local, network and group configurations such as Domains and Security Policies. Particular attention is paid to the development of Security Templates and security assessment of host configuration. As a result of the course, you will have a deep understanding of the built-in defense mechanisms of modern operating systems and be able to make the most of these opportunities to implement the Bastion Host concept.
Network Security Advanced
The course is focused on improving knowledge in the field of security of modern network technologies based on the concept of Zero-Trust Networks. It covers Network configuration management, VLANs, micro segmentation, DNS Security, SMTP, Web App, DDoS protection, routing security, including BGP. Special attention is paid to network security in the virtualized environment and SD-WAN technology.
Python Programming
The course is intended to be a full-size course covering the Python programming language. We are going to cover basic constructions of the language, the design principles of the language, how different syntax sugar in the language works, how to work with lazy computations and what do you need to know to write production code in Python. The course is intended for the people who already had an introductory course on Python or familiar with one of the other programming languages like Java or C++.
Operating Systems
The objective of the Operating Systems course is to familiarise students with the basic organising principles and technologies used in modern computing platforms (the operating systems together with the computer hardware), as well as their place and role in the IT field. The course will offer ample practical exercises to strengthen the understanding of core topics and to prepare students to advance their knowledge of the modern means of parallel and distributed processes for their effective application in scientific research and computing.
Computer Networks
This is an introductory course on computer networking, specifically the Internet. It focuses on modern network protocols, ranging from low-level protocols such as Ethernet to application protocols based on HTTP. The course also grounds many of the concepts currently used in practice, such as DNS security, dynamic routing, or load balancing.
Relational Databases & Web Development
The course gives a thorough overview of modern web development approaches, techniques, and architecture patterns. Topics cover frontend and backend development, as well as backing services like databases, queues and object storage, and infrastructure services like load-balancers and monitoring tools. The course doesn’t focus on any certain language or framework, but python will be used for code examples and exercises.
Cybersecurity Overview
This is an introductory course on Cyber Security covering core domains required in day-by-day security practice. It focuses on network, host and application security and modern challenges such as APT and Critical Infrastructure Protection. The course provides both theoretical knowledge and practical experience.
Applied Threat Intelligence
Elite training by industry experts shows in a realistic and applied way how to get the most from threat intelligence. Attendees will learn how to collect, analyze and use threat intelligence-related data, tools and frameworks. This works well to boost existing teams with leading Threat Intelligence practices, tools and methodologies.
Crisis Communications: Data Breach Mitigation Strategy
Developed to enhance leadership teams’ ability to make effective decisions to reduce further risk and damage in the heat of a data breach, this course encourages delegates to establish an incident communication plan based on their own organization’s leadership style and security programme maturity. You’ll put your plan into action from incident discovery to resolution with in-depth scenario-based learning based on real-world cases.
Use Remaining Credits
Collaborative & Cross-disciplinary
Work with students from other fields to tackle real-world challenges from multiple angles. These electives are designed to stretch your thinking and build collaborative problem-solving skills.
Creative Writing, Storytelling, and Creative Performing
Creativity is the engine of the 21st century. The contemporary world is full of ideas, concepts, products, and people trying to find their way through this maze. Every start-up has to have not only the idea and (future) product but first of all the story to tell both to the potential investors as well as users, now and future, which brings us to the necessity of creativity and storytelling. Whatever you do, you have to have a story. Another intent of this course is bringing together people of different backgrounds and knowledge, to engage them in working towards a common goal in a new way – through writing a piece of fiction and performing it. Uniting those two fields gives students the possibility to try out their abilities in a safe environment as well as cooperate with other students, bringing in new viewpoints and experiences. This is one of the best ways of establishing teams that have innovation at their core.
Leadership
This course is designed to equip participants with the necessary skills to cultivate long-lasting leadership influence and make a meaningful impact, even in the face of change, crises, and criticism. While technical or "hard" skills may secure high-potential individuals top positions, this course focuses on the development of "real skills" that enable leaders to build, sustain, and thrive in their leadership roles. The course will empower future leaders with the transformative Three Pillars of Leadership: Awareness, Behavior, and Visibility to take their leadership to the next level.
English Business Communication
This course is a business English course for business people. It consists of authentic topics of great interest to everyone involved in or studying international business. The course reflects the latest trends in the business world. If you are into business, the course will greatly improve your ability to communicate in English in a wide range of situations. If you are a student of business, the course will develop the communication skills you need to succeed in a professional environment and will broaden your knowledge of the business world. Everybody studying this course will become more fluent and confident in using the language of business in a variety of contexts.
Pitching to Investors
Pitching to Investors prepares students to craft and deliver concise, high-impact presentations to one of the most demanding audiences: investors. Over three weeks, participants refine their individual presentation style, learn how to frame startup narratives, and master the use of visual storytelling to support funding goals. The course culminates in a polished, investor-grade pitch.
Product Analytics Fundamentals
Product Analytics Fundamentals is a comprehensive course that covers the essential elements of analytics, including applied statistics, programming skills, AB-testing, visualization, and understanding data. This course is designed to provide students with a solid foundation in analytics so they can make data-driven decisions. Students will learn how to collect and analyze data using statistical methods, how to extract insights from data, how to conduct AB-testing to optimize product performance, and how to visualize data to communicate insights effectively.
Technical Product Management
This course has two parts: (1) building and launching a user-facing software product with a special emphasis on understanding user needs, and (2) applying data-driven product development techniques to iteratively improve the product. Students will learn how to transform an idea into software requirements through user research, prototyping, and usability tests, and then they will proceed to launch the MVP version of the product. The students will apply an iterative, data-driven approach to developing a product, integrate event analytics, and run controlled experiments.
Agile Product Development
Building great tech requires more than great product knowledge and management - it requires a deep understanding of Agile ways of working. “Being agile” is so much more than dev team practices, it is being mentally flexible and highly adaptable to constant change. In this class, students will learn how to navigate the jargon and use agile concepts to achieve terrific results with teams and organizations. In addition to learning about the frameworks scrum and kanban, we will review the philosophical principles behind why these frameworks can be useful, how to modify or recombine them, and how to be sensitive to the human psychology that makes it all work. Through a combination of lectures, small-group work, learning games, workshops, and projects (both structured and self-directed), students will learn to avoid the pitfalls and leverage Agile for their product and business success.
Use Remaining Credits
Free Electives
Take courses outside your programme to broaden your perspective. As long as you meet the technical requirements and there's space, you're welcome to explore new topics and expand your toolkit.