7М06303 CRYPTOLOGY
PROGRAM PASSPORT
- · Specialty Name: Cryptology
- · Speciality Code: 7М06303
- · Faculty: Information technology
QUALIFICATION
- · Scientific and pedagogical direction - Master of Engineering Sciences
MODEL OF GRADUATING STUDENT
Upon completion of this educational program, master's students are expected to be able to:
- Use analytical and experimental research methods to propose hypotheses on the topic of scientific research using knowledge in the field of history and philosophy of science, the subject area, to speak English as a means of communication in professional and scientific activities
- Determine the content, methods and means of training sessions in accordance with the objectives of the course for the development of the curriculum and conducting lectures and practical classes, to carry out educational activities in professional educational institutions based on psychological and pedagogical principles
- Сonduct their own research and experiments in the field of cryptanalysis, having in-depth knowledge of modern methods and tools of cryptographic analysis and capable of analyzing and improving existing cryptographic systems
- Сonduct their own research and practical projects in the field of neural networks, computer forensics and machine learning; use information sources and analytical methods of competitive intelligence, a system of measures to counter industrial espionage, means and methods of unauthorized access to information system resources
- Аpply the acquired knowledge in practice by participating in scientific research and projects to ensure the cybernetic security of information
- Сonduct research on new threats and protection methods, develop recommendations for improving the security of systems and applications, and participate in the development of secure architectures and solutions
- Аnalyze the threats and risks of information security associated with the use of quantum technologies and develop strategies to manage and reduce them; identify the most critical vulnerabilities and take measures to eliminate them using modern methods and approaches
- Formulate methods for analyzing security protocols and key transfer protocols, key transfer using symmetric encryption, key transfer using asymmetric encryption
- Identify vulnerabilities and risks, analyze existing protection mechanisms and offer recommendations for improvement, use methods to detect and prevent attacks on network resources and devices, have skills in using analytical information systems to monitor and analyze information security
- Conduct an information security audit, including information collection and analysis, verification of compliance with regulatory requirements and standards, as well as identification of weaknesses and vulnerabilities
Mandatory disciplines:
History and philosophy of science
Foreign Language (professional)
Pedagogy of higher education
Psychology of management
Organization and Planning of Scientific Research (in English)
Cyber security of information
Security of software applications
Security analysis of operating systems
Post-quantum cryptography
Organization of information security systems
Elective disciplines:
Cryptanalysis-1
Theoretical-numerical methods of cryptography
Cryptanalysis-2
Models and methods of the theory of neural networks
Computer Forensics and Competitive Intelligence (OSINT)
Research on the use of machine learning to detect malicious objects
Principles of construction of cryptographic protocols
Policies and models of access control in computer systems
Key management in cryptosystems
Audit of information security
Analysis of network security
Analytical information security systems
PROFESSIONAL INTERNSHIPS:
Pedagogical practice
Research practice
Research Seminar
Scientific Internship






