6B06302 Cryptology

PROGRAM PASSPORT

  • ·       Specialty Name: Cryptology
  • ·       Speciality Code: 6B06302
  • ·       Faculty: Information technology

QUALIFICATION

  • ·       First Stage of Higher Education - Bachelor of Information and Communication Technology

MODEL OF GRADUATING STUDENT

Upon completion of this educational program, students are expected to be able to:

1. Use modern information and communication tools and technologies, possess ICT skills in the state and foreign languages.

2. Evaluate different situations based on a holistic systemic scientific worldview; form and define personality in the social environment and orient to a healthy lifestyle.

3. Apply basic knowledge of classical sections of fundamental mathematics, basic ideas and methods of mathematics, system of basic mathematical structures in the field of cryptology.

4. Apply programming languages (C++, Python, Java, C#) in software development, web applications, database management systems and to solve applied problems.

5. Possess modern technologies, models, methods and tools for information systems security management and risk analysis, including secure operating systems, computer networks, and telecommunications.

6. Possess the principles of encryption algorithms construction, implement cryptographic methods of data encryption in the problems of information protection at the software and hardware levels;

7. Understand the structure of modern ciphers and their characteristics that affect the cryptographic strength of ciphers; analyze the level of cryptographic strength of encryption algorithms; apply statistical and analytical methods of cryptanalysis to modern cryptosystems.

8. Apply legal norms and standards, technical systems, and means of cryptographic data protection in the field of information security, including cryptology.

9. Apply standards and specifications in the field of web application security, principles, and methods of protecting devices and networks within the framework of the Internet of Things (IoT) infrastructure, possess technologies and cloud-based tools for ensuring cybersecurity of objects of different levels.

10. Design, develop, test reliable software, understand the principle of artificial intelligence and apply machine learning algorithms in solving applied problems, including in the field of cryptology.

11. Implement cryptographic schemes based on elliptic curves, apply basic quantum key distribution protocols, hash functions in digital signatures and authentication, cryptographic protocols to ensure confidentiality, integrity and authentication in digital communications

12. Demonstrate knowledge of the basic regularities of functioning and development of nature and society, the ability to adequately navigate in various socio-economic, socio-legal, ethical, political and emergency situations.

Mandatory disciplines:

Introduction to Cryptology

Mathematics

Discrete mathematics

Numbers theory and fundamentals of cryptography

Theory of Probability and Mathematical Statistics

Basics of information security

Algorithms and data structures in cryptography

Object-Oriented Programming (С++)

Software development

Programming on Python Language

Database theory

Machine learning

Operating systems and security

Advanced cryptosystems

Cryptographic Techniques

Hardware implementation of cryptalgorithms

Elliptic Curve Cryptography

Quantum cryptography

Cryptographic protocols

Public key cryptography and digital signature

History of Kazakhstan

Philosophy

Module of socio-political knowledge (Sociology, Political science, Culture, Psychology)

Information and Communication Technologies (english)

Foreign Language  

Kazakh (Russian) Language      

Physical Training

Elective disciplines:

The theory of pseudo-random generators

Cryptographic hash functions

Technical Control Systems        

Regulatory and Legal Support of Information Security  

Standardization and Certification of Cryptographic Tools

Analysis of Information Security Systems      

Computer Networks and Telecommunications  

Network security

Web – Programming

Web Security

Cryptanalysis of Block Ciphers    

Cryptographic analysis of open cryptography methods      

Computer Forensics

Cybersecurity Technologies

Technical means and methods of information protection

Security models for computer systems

Cloud security      

Security of the Internet of Things    

Al-Farabi and modernity

Abai 's Teaching

Legal bases of corruption control

Ecology and Human Life Safety

Entrepreneurship

Scientific Research Methods

Basics of financial literacy

PROFESSIONAL INTERNSHIPS:

Professional (educational) practice

Professional (production) practice

Professional (production) practice

Professional (production) practice

Professional (pre-diploma) practice