Speciality Code:


Speciality Name:

Forensic examination of computer technology



  • Scientific and pedagogical direction - Master of Law Sciences
  • Model of graduating student
  • Mandatory disciplines
  • Elective disciplines
  • Professional
ON 1
interpret the concept of offense, to differentiate a criminal offense from others, to determine the composition of the criminal offense, crime;
to explain the types of proceedings under the Kazakh legislation, to understand the objectives of each stage of the proceedings, the subject of proof, types of proceedings, their basic rules;
to interpret the criminalistic characteristics of crimes, to possess forensic techniques of collecting material traces and their ability to establish the circumstances of the cases;
understand the role of tactics in the conduct of procedural actions, the importance of modern forensic technologies in the disclosure and investigation of cases;
to systematize normative legal acts in accordance with the principles of organization and functions, tasks of expert activity in the Republic of Kazakhstan
to highlight the procedural features of integrated, re-examinations and other;
ON 2
to substantiate the distinctive features of forensic examination as a form of application of special knowledge and as a source of evidence;
explain the reasons for the appointment and forensic examination of computer technology;
to assess the rights and duties of a forensic expert in the examination of computer technology;
to justify the structure of the expert opinion and its evidentiary value;
ON 3
to explain the integrative processes forming the area of knowledge in forensic expertise "forensic examination of computer technology»;
reveal the methodological basis of expertise of computer technologies;
explain the state of the computer network as a whole and each network tool separately, the possible place of purchase (purchase), clarification of changes made to the original configuration (for example, the addition of additional network devices, expansion devices on the server or workstations, etc.).;
interpret the properties and characteristics of a network resource and its architecture;
interpret the General characteristics of the software components (software);
explain security features (software, hardware and software) against unauthorized access and copying properties, etc.;
ON 4
demonstrate the functional purpose of the hardware, the type (brand, model), its specifications and parameters;
classify specific software (system or application) of the presented software;
explain the specific characteristics of the logical and physical placement of information on the test data storage;
to interpret the ways of formatting the recording medium and the recording method;
interpret the definitions of the types of detected files and programs by which they were created and can be viewed or processed;
interpret how data are entered and obtained on the software tool presented for the study;
ON 5
determine the role and functionality of the hardware in a particular computer system;
determine the initial state (configuration, characteristics) of the hardware;
determine deviations from standard (normal) parameters in the hardware, including physical defects;
determine the operating conditions of the hardware;
is the presented computer equipment in good condition, etc.;
ON 6
Identify the causes of changes in the functional (consumer) properties in the initial configuration of the presented hardware;
determine the causal relationship between actions (input, modification, deletion, etc.)) with data and the occurred event (for example, a violation in the operation of the computer system, including disruptions, etc.);
determine the method and under what circumstances actions or operations (blocking, modification, copying, deletion) of certain data on the data carrier are performed;
install signs to overcome the protection (or attempt to access) on the recording medium, etc.;
identify the main attributes of the data contained on the studied data storage (in this computer system) – file sizes, total data, names and types of files, the date of their creation, other characteristics;
determine the type of information placed on the investigated media – archive, deleted, hidden or explicit information.
ON 7
identify the owner (user) of the computer system (including names, passwords, access rights, etc.).) are available in the media;
determine the Internet addresses that were accessed from this computer tool;
identify information about electronic payments and the use of credit card codes;
identify the presence in the personal computer (computer system) of data containing information and facts related to the case under investigation;
determine the initial state of the data on the media, etc.
ON 8
participate in research activities, including in the context of self-elected, theoretically and practically significant, in-demand judicial and investigative practice;
engage in innovative teaching activities in the aspect of the necessary organization and implementation of self-education and training;
use in expert research, scientific research achievements of computer technology;
develop, generate and implement projects to create new knowledge in the field of "forensic computer technology tools»;
ON 9
to assess the relationship between the production of expertise, research, scientific and methodological forms of activity;
to characterize the relationship between the principles of the organization of expert activity and the legal norms on the assignment of qualification certificates for the right to conduct forensic examinations, periodic certification of forensic experts;
explain the relationship between the principles of the organization of expert activities and legal norms for testing methods, validation of methods, techniques;
show the relationship and the role of the integration of scientific knowledge from the natural Sciences (microelectronics, system administration, information systems, etc.) and prospects for the development of expertise of computer technology;
to interpret complex expertise as the integration of knowledge from the field of various expert specialties - expertise of computer technology, forensic accounting expertise, technical expertise of documents, video Phonographic expertise, etc.;
ON 10
evaluate the results of expert research and formulate conclusions in accordance with the General methodology of analysis and evaluation of the identified information;
to argue the relationship between the objectives of the examination and the competence of the expert in the field of computer technology;
justify the reasons for the written refusal of the examination or the expert's request;
determine the validity of the appointment of re-examinations;
ON 11
to present the results of step-by-step research and applied methods in conclusion in accordance with the requirements of the Laws and scientific and methodological developments;
during interrogations during the investigation, court proceedings it is reasonable to argue the expert opinions;
ON 12
work in a team, find compromises and correlate your opinion with the opinion of the team; possess positive communication skills based on the principles of patriotism, citizenship and tolerance;
to be able to self-study at the end of training to expand their knowledge on the basis of information and educational technologies; to be willing to work in a multinational and multicultural team.
  Data for 2017-2020 years
  Data for 2017-2020 years
  Data for 2017-2020 years