Master degree program
Cryptology

Cryptology

QUALIFICATION

  • Scientific and pedagogical direction - Master of Engineering Sciences

MODEL OF GRADUATING STUDENT

Program passport

Speciality Name
Cryptology
Speciality Code
7M06303
Faculty
Information technology

disciplines

Cyber security of information
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to form knowledge in the field of ensuring cyber security. Will be studied: the main means and methods of ensuring cyber security of information, cybercrime, cyber-attacks, technical approaches and security tools, methods and means of ensuring cyber security in computer and infocommunication systems and networks.

Foreign language (professional)
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to form practical skills in various types of speech activity in a foreign language. The training course builds the ability to perceive, understand and translate information in the modern global space, participate in scientific events to test their own research. The discipline is aimed at improving competencies in accordance with international standards of foreign language education.

History and philosophy of science
  • Number of credits - 3
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to be considered on the basis of historical dynamics and in a historically changing socio - cultural context. Introduces the problems of the phenomenon of Science, which is a subject of special philosophical analysis, forms knowledge about the history and theory of Science, the laws of the development of Science and the structure of scientific knowledge, the features of science as a specialty and social institution, the role of Science in the development of society.

Organization and Planning of Scientific Research (in English)
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline to form the ability to apply practical skills in the organization and planning of scientific research. The discipline studies: forms and methods of planning, organization and design of scientific articles and dissertations; forms of summarizing the results of scientific research in presentations, speeches, projects, articles.

Organization of information security systems
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to assess the risks of the organization’s information resources and information security audit. Will be studied: A systematic approach to information security management. Standardization in the field of information security management. The content and organization of the information security audit process. Information security risk assessment. Reporting documents based on audit results. Implementation of recommendations based on the results of an information security audit.

Pedagogy of higher education
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose is the formation of the ability of pedagogical activity through the knowledge of higher education didactics, theories of upbringing and education management, analysis, and self-assessment of teaching activities. The course covers the educational activity design of specialists, Bologna process implementation, acquiring a lecturer, and curatorial skills by TLA-strategies.

Post-quantum cryptography
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of quantum-stable cryptography is to develop cryptographic systems that would be protected from attacks from quantum computers. Studying in the field of NP-complex problems, areas of post-quantum cryptography, error correcting codes, attacks on the Mac Alice system. Expected results: to know cryptographic methods, algorithms, protocols used to ensure security in computer networks; to solve typical problems of noise-resistant encoding and decoding of messages.

Psychology of management
  • Number of credits - 3
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course reveals the subject, the basic principles of management psychology, personality in managerial interactions, personal behavior management, psychology of managing group phenomena and processes, psychological characteristics of the leader's personality, individual management style, psychology of influence in management activities, conflict management.

Security analysis of operating systems
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to apply information security requirements and skills in using methods to ensure information security in operating systems. Will be studied: Methods and tools for testing and protecting operating system programs. Principles of competent administration of operating systems. Analysis of sources and security risks in operating systems. Means and methods aimed at eliminating security threats in operating systems.

Security of software applications
  • Number of credits - 5
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to master the disciplinary competencies associated with the disclosure of technologies for the intellectual analysis of large information arrays through the organization of software security. Will be studied: Theoretical and practical foundations of creating reliable and secure software information systems. Rules, steps and technologies for building reliable software. Requirements for functional reliability and software architecture of critical systems

Data for 2021-2024 years

disciplines

Analysis of network security
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to acquaint with the basic principles of building wired and wireless communication systems and ensuring their safety. Will be studied: General patterns of construction of modern network communication systems. Methods and tools for securing network connections. Rules, steps and technologies for building reliable software. Methods and tools for testing and protecting programs from research by attackers.

Analytical information security systems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to master the disciplinary competencies associated with the disclosure of technologies for the intellectual analysis of large information arrays through information-analytical systems. Will be studied: The main provisions related to information and analytical security systems. Principles related to the organization of competitive intelligence. Models of the competitive environment. Methods of collecting information about legal entities and individuals. Legal foundations and principles of business intelligence.

Audit of information security
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline "Audit of information security" is the development of disciplinary competencies in the use of a set of measures in the information protection system based on the organization and conduct of an information security audit. Students will learn following aspects: Content of cyclical quality management model of processes and systems; Legal and methodological foundations of the audit of information security; International legal aspects, standards and guidelines on the fundamentals of auditing and information security; Methods of information security assessment; Directions for the provision and evaluation of information security.

Computer Forensics and Competitive Intelligence (OSINT)
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline: the formation knowledge system in the field of cyber security, the development of skills in the use of competitive intelligence techniques. The following will be studied: means of ensuring cybernetic security of information, technical and regulatory approaches to the analysis and identification of cybercrimes, identification and prevention of cyber threats. Working with databases, cyber intelligence methods, machine learning and neural networks, analysis of unstructured information.

Cryptanalysis-1
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to use the basic principles and methods of analyzing cryptographic algorithms. Will be studied: Theoretical and practical foundations of creating a reliable and secure cryptographic protocol protocol. Rules and stages of use when choosing a model in cryptography. Reliability requirements of the method used. Classification of the main methods of analysis of cryptographic algorithms and various methods and means of cryptanalysis.

Cryptanalysis-2
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to provide a deep understanding of cryptanalysis. By studying the discipline, masters will be able to: Master modern methods of ensuring confidentiality, integrity and authentication of data. Analyze the cryptographic properties of existing encryption algorithms. Implement software implementations of modern cryptographic and cryptanalytic methods. Methods of ensuring confidentiality, integrity and authentication of data; modern methods of cryptanalysis; statistical, algebraic and other methods of cryptanalysis.

Key management in cryptosystems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to use the principles of construction and mathematical justification of key management. Will be studied: Key creation mechanisms using symmetric cryptographic methods, installation of a conceptual key distribution model, characteristics of key management services. requirements for key management systems, principles of material management for creating encryption keys during its life cycle.

Models and methods of the theory of neural networks
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to form the ability to apply the mathematical and technological foundations of the theory of neural networks. Will be explored: Models of the neuron. Neural network architectures. Single and multi-layer neurons. Principles of construction of artificial neurons. Learning rules perceptron. Mathematical description of the perceptron. Learning the Hebb rule of neural networks. Pattern recognition algorithm for an associative neural network according to the Kohonen Rule.

Policies and models of access control in computer systems
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to apply the most common types of security policies and the corresponding mathematical models for restricting access to information for computer systems. Will be studied: the idea of computer systems and their protection mechanisms in terms of object-subject models, formal models of access control, criteria and security classes of computer technology and automated information systems.

Principles of construction of cryptographic protocols
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to state the basic principles of construction and mathematical justification of cryptographic protocols. Will be studied: the basics of discrete algebra and number theory and the application of a number-theoretic apparatus for solving cryptography problems, the basic mathematical methods used in the synthesis and analysis of typical cryptographic protocols, the advantages and disadvantages of cryptographic protocols, the requirement for the security of cryptographic protocols

Research on the use of machine learning to detect malicious objects
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The course will examine the current state of the use of machine learning to automate the detection of malicious objects in cyber-physical systems, the most common malicious objects in systems of this type, the most promising machine learning algorithms that allow predicting the presence of malicious objects in cyber-physical systems

Theoretical-numerical methods of cryptography
  • Type of control - [RK1+MT+RK2+Exam] (100)
  • Description - The purpose of the discipline is to study the number-theoretic and algebraic foundations of cryptography and the methods and algorithms of cryptographic information protection systems with secret and public keys. Learning outcomes: master the basic concepts of modular arithmetic (theory of comparisons) of integers; master modern cryptography methods; be able to apply modular arithmetic algorithms for integers and polynomials; develop parameters required by practical circumstances.

Data for 2021-2024 years

INTERNSHIPS

Pedagogical
  • Type of control - Защита практики
  • Description - Formation of practical, educational-methodical skills of conducting lectures, seminars, creatively apply scientific, theoretical knowledge, practical skills in teaching activities, conduct training sessions in the disciplines of the specialty; own modern professional techniques, methods of training, use in practice the latest theoretical, methodological advances, make educational, methodological documentation.

Research
  • Type of control - Защита практики
  • Description - The purpose of the practice: gaining experience in the study of an actual scientific problem, expand the professional knowledge gained in the learning process, and developing practical skills for conducting independent scientific work. The practice is aimed at developing the skills of research, analysis and application of economic knowledge.

Data for 2021-2024 years