7М06303 CRYPTOLOGY

 

PROGRAM PASSPORT

 

  • ·       Specialty Name: Cryptology
  • ·       Speciality Code: 7М06303
  • ·       Faculty: Information technology

 

 

QUALIFICATION

 

  • · Scientific and pedagogical direction - Master of Engineering Sciences

 

MODEL OF GRADUATING STUDENT 

 

Upon completion of this educational program, master's students are expected to be able to: 

  1. Use analytical and experimental research methods to propose hypotheses on the topic of scientific research using knowledge in the field of history and philosophy of science, the subject area, to speak English as a means of communication in professional and scientific activities
  2. Determine the content, methods and means of training sessions in accordance with the objectives of the course for the development of the curriculum and conducting lectures and practical classes, to carry out educational activities in professional educational institutions based on psychological and pedagogical principles
  3. Сonduct their own research and experiments in the field of cryptanalysis, having in-depth knowledge of modern methods and tools of cryptographic analysis and capable of analyzing and improving existing cryptographic systems
  4. Сonduct their own research and practical projects in the field of neural networks, computer forensics and machine learning; use information sources and analytical methods of competitive intelligence, a system of measures to counter industrial espionage, means and methods of unauthorized access to information system resources
  5. Аpply the acquired knowledge in practice by participating in scientific research and projects to ensure the cybernetic security of information
  6. Сonduct research on new threats and protection methods, develop recommendations for improving the security of systems and applications, and participate in the development of secure architectures and solutions
  7. Аnalyze the threats and risks of information security associated with the use of quantum technologies and develop strategies to manage and reduce them; identify the most critical vulnerabilities and take measures to eliminate them using modern methods and approaches
  8. Formulate methods for analyzing security protocols and key transfer protocols, key transfer using symmetric encryption, key transfer using asymmetric encryption
  9. Identify vulnerabilities and risks, analyze existing protection mechanisms and offer recommendations for improvement, use methods to detect and prevent attacks on network resources and devices, have skills in using analytical information systems to monitor and analyze information security
  10. Conduct an information security audit, including information collection and analysis, verification of compliance with regulatory requirements and standards, as well as identification of weaknesses and vulnerabilities

 

Mandatory disciplines:

 

History and philosophy of science

Foreign Language (professional)

Pedagogy of higher education

Psychology of management

Organization and Planning of Scientific Research (in English)

Cyber security of information

Security of software applications

Security analysis of operating systems

Post-quantum cryptography

Organization of information security systems

 

Elective disciplines:

 

Cryptanalysis-1  

Theoretical-numerical methods of cryptography

Cryptanalysis-2

Models and methods of the theory of neural networks

Computer Forensics and Competitive Intelligence (OSINT)          

Research on the use of machine learning to detect malicious objects

Principles of construction of cryptographic protocols

Policies and models of access control in computer systems

Key management in cryptosystems

Audit of information security

Analysis of network security

Analytical information security systems

 

PROFESSIONAL INTERNSHIPS:

Pedagogical practice

Research practice

Research Seminar

Scientific Internship