6B06302 Cryptology
PROGRAM PASSPORT
- · Specialty Name: Cryptology
- · Speciality Code: 6B06302
- · Faculty: Information technology
QUALIFICATION
- · First Stage of Higher Education - Bachelor of Information and Communication Technology
MODEL OF GRADUATING STUDENT
Upon completion of this educational program, students are expected to be able to:
1. Use modern information and communication tools and technologies, possess ICT skills in the state and foreign languages.
2. Evaluate different situations based on a holistic systemic scientific worldview; form and define personality in the social environment and orient to a healthy lifestyle.
3. Apply basic knowledge of classical sections of fundamental mathematics, basic ideas and methods of mathematics, system of basic mathematical structures in the field of cryptology.
4. Apply programming languages (C++, Python, Java, C#) in software development, web applications, database management systems and to solve applied problems.
5. Possess modern technologies, models, methods and tools for information systems security management and risk analysis, including secure operating systems, computer networks, and telecommunications.
6. Possess the principles of encryption algorithms construction, implement cryptographic methods of data encryption in the problems of information protection at the software and hardware levels;
7. Understand the structure of modern ciphers and their characteristics that affect the cryptographic strength of ciphers; analyze the level of cryptographic strength of encryption algorithms; apply statistical and analytical methods of cryptanalysis to modern cryptosystems.
8. Apply legal norms and standards, technical systems, and means of cryptographic data protection in the field of information security, including cryptology.
9. Apply standards and specifications in the field of web application security, principles, and methods of protecting devices and networks within the framework of the Internet of Things (IoT) infrastructure, possess technologies and cloud-based tools for ensuring cybersecurity of objects of different levels.
10. Design, develop, test reliable software, understand the principle of artificial intelligence and apply machine learning algorithms in solving applied problems, including in the field of cryptology.
11. Implement cryptographic schemes based on elliptic curves, apply basic quantum key distribution protocols, hash functions in digital signatures and authentication, cryptographic protocols to ensure confidentiality, integrity and authentication in digital communications
12. Demonstrate knowledge of the basic regularities of functioning and development of nature and society, the ability to adequately navigate in various socio-economic, socio-legal, ethical, political and emergency situations.
Mandatory disciplines:
Introduction to Cryptology
Mathematics
Discrete mathematics
Numbers theory and fundamentals of cryptography
Theory of Probability and Mathematical Statistics
Basics of information security
Algorithms and data structures in cryptography
Object-Oriented Programming (С++)
Software development
Programming on Python Language
Database theory
Machine learning
Operating systems and security
Advanced cryptosystems
Cryptographic Techniques
Hardware implementation of cryptalgorithms
Elliptic Curve Cryptography
Quantum cryptography
Cryptographic protocols
Public key cryptography and digital signature
History of Kazakhstan
Philosophy
Module of socio-political knowledge (Sociology, Political science, Culture, Psychology)
Information and Communication Technologies (english)
Foreign Language
Kazakh (Russian) Language
Physical Training
Elective disciplines:
The theory of pseudo-random generators
Cryptographic hash functions
Technical Control Systems
Regulatory and Legal Support of Information Security
Standardization and Certification of Cryptographic Tools
Analysis of Information Security Systems
Computer Networks and Telecommunications
Network security
Web – Programming
Web Security
Cryptanalysis of Block Ciphers
Cryptographic analysis of open cryptography methods
Computer Forensics
Cybersecurity Technologies
Technical means and methods of information protection
Security models for computer systems
Cloud security
Security of the Internet of Things
Al-Farabi and modernity
Abai 's Teaching
Legal bases of corruption control
Ecology and Human Life Safety
Entrepreneurship
Scientific Research Methods
Basics of financial literacy
PROFESSIONAL INTERNSHIPS:
Professional (educational) practice
Professional (production) practice
Professional (production) practice
Professional (production) practice
Professional (pre-diploma) practice






