Cybersecurity

Cybersecurity

6B06301

Cyber security-includes work on information security, independent and objective assessment of the current level of security of computer systems and networks, identification of existing security problems, design and development of information security systems for organizations and enterprises. The program will allow you to develop skills in software development, as well as in technologies for protecting information and Informatization objects, ensuring information integrity and analyzing system security

Profile subjects: informatics + mathematics

Contacts

Admission Committee

(7172) 64-57-10
info@astanait.edu.kz

Mon-Fri 9:00 – 18:00

Career opportunities

– Specialist on cybersecurity;
– Information security specialist;
– Information security engineer;
– Specialist in hardware and software protection of information;
– SAP specialist;
– Anti-fraud analysis;
-Reverse engineering specialist or code analyst;
– Developer of information security system;
– Specialist in forensic or cyber crime investigation;
– Pentester.

The goal of the educational program

Training of highly qualified personnel with Applied mi knowledge mi integrity, confidentiality, availability of data, existing methods of design and support computer networks, security issues related to the operation of local and global networks.

Objectives of the educational program

  • Ensuring the protection of information and informatization objects using standards and protocols of network interaction.
  • Monitoring, analysis, and comparison of the effectiveness of software and hardware protection of information in operating systems and networks.
  • Conducting the correctness of the system administration and hardware and software protection.
  • Conducting continuous monitoring and control of information security, identifying threats, vulnerabilities, and risks in the field of Internet of Things security.
  • Development, design, and maintenance of the organization's network security tools.
  • Assessment of the security level of the organization's computer systems and networks and preparation of accompanying documentation.

6B06 - Information and Communication Technologies

Education code and classification

058 - Information Security

Education Programs Group

061 - Information and Communication Technologies

Code and classification of training directions

Requirements for evaluating the learning outcomes of the educational program

After completing the EP students will achieve the following learning outcomes:
  • Develop secure server-side web client applications and mobile applications.
  • Implement basic network communication between devices, calculate and apply addressing schemes, set up and configure network devices.
  • Demonstrate knowledge of computer systems architecture, manage operating systems.
  • Apply domestic and foreign information security standards in organizations.
  • Apply practical programming skills and explain the general methodological foundations of program development, write system programs for device drivers, interface modules with non-standard equipment and program microcontrollers.
  • Explain and understand the legal framework of the Republic of Kazakhstan and other countries, as well as standardization and certification procedures in the field of information security.
  • Develop an enterprise information security policy, apply project management tools at various stages of the project life cycle, make a qualitative and quantitative assessment of project risks, determine the effectiveness of the project, taking into account environmental safety; critically evaluate and interpret information in the field of cybersecurity, economics and law.
  • Apply data protection technologies in computer systems and networks.
  • Design the layout of printed circuit boards, constructive and technological modules of the first level using application packages, analyze microprocessor devices, use tools for debugging and testing embedded systems.
  • Analyze and monitor host security.
  • Apply technical means and network security software services to ensure business continuity.
  • Independently analyze modern sources, draw conclusions, argue them and make decisions based on information.
  • Systematic understanding of the role of personality and events in shaping the current situation; the ability to critically evaluate and position actions regarding complex social processes, taking into account historical factors.
  • Be able to express ideas and arguments on the topic of information technology in writing and orally, speak to an audience and defend a point of view in the state, English and in the language of interethnic communication.
  • The ability to purposefully use a variety of means of physical culture to maintain and improve health.

The list of competencies and the results of the educational program

The list of competencies of the educational program

OK1. The ability to understand the driving forces and patterns of the historical process, the place of a person in the historical process and the ability to understand philosophy as a methodology of human activity, readiness for self-knowledge, initiative, development of cultural wealth as a factor in harmonizing personal and interpersonal relationships
OK2. The ability to form and develop skills and competencies in the field of organization, planning and production management, the ability to apply the acquired knowledge to comprehend the surrounding environmental reality, the ability to summarize, analyze, predict when setting goals in the professional field and choose ways to achieve them using the scientific research methodology
OK3. Ability for written and oral communication in the state language and the language of interethnic communication, as well as in a foreign (English) language. The ability to use foreign sources of information, to have communication skills, to public speaking, argumentation, conducting discussions and polemics in a foreign language
OK4. The ability to be competent in the choice of ICT and mathematical modeling methods for solving specific engineering problems, the ability to be ready to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it
PC1. The ability to understand modern standards, regulatory framework, the basics of economic knowledge, scientific ideas about project management and technological entrepreneurship.
PC2. The ability to professionally use modern computer equipment, network components, computer programs and complex computing systems (in accordance with the objectives of the program), as well as use the safety rules, industrial sanitation, fire safety and labor protection standards.
PC3. The ability to possess the skills of using and applying algorithms, data structures and modern methods for creating (developing) and further supporting various software systems for analyzing big data.
PC4. The ability to use the basic principles and methods for solving managerial problems, the ability to execute project documentation in a software environment using computer graphics for various types of projects.
PC5. The ability to be competent in the choice of mathematical modeling methods for solving specific applied problems in big data analysis, including the willingness to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it.
PC6. The ability to design the architectures of components of information systems, including the human-machine interface of hardware and software systems, and to select operating systems and information protection methods.
PC7. Ability to develop information and information system software based on modern development methods and tools.
PC8. Ability to collect, process and analyze data using the organization’s methodological and technological infrastructure.
PC9. The ability to manage the life cycle stages of the methodological and technological infrastructure of software development, data analysis, design of IT infrastructure in various organizations.
PC10. The ability to use modern programming environments for the design and implementation of software solutions and databases for information and communication technologies.
PС11. The ability to apply the elements of probability theory and mathematical statistics that underlie the models and methods of data science, to choose the right methods of data analysis, machine learning and artificial intelligence to solve practical problems.
PС12. The ability to develop and implement safe and testable solutions based on new methods and technologies for information security, used when working with information and communication technologies.

Learning Outcomes

LO1. Explain and understand the regulatory framework, including documents, standardization and certification procedures in the development of information and communication technologies.
LO2. Apply domestic and foreign standards for software development in organizations.
LO3. Apply practical programming skills and explain the general methodological foundations of program development, create system programs for various levels of computer systems and software architecture, including low-level programming and microcontroller programming.
LO4. Demonstrate knowledge of the architecture of computer systems, manage operating systems.
LO5. Implement basic network communication between devices, calculate and apply addressing schemes, configure and configure network devices required to ensure the functionality of information and communication technologies.
LO6. Apply project management tools at various stages of the project life cycle, make a qualitative and quantitative assessment of project risks, determine the effectiveness of the project.
LO7. Apply mathematical tools to analyze software systems and data based on statistical and probabilistic models.
LO8. Apply hardware and software services to ensure the continuity of the process of developing software systems.
LO9. Independently analyze modern sources, draw conclusions, argue them and make decisions based on information.
LO10. Develop secure server-side web client applications and mobile applications.

Assessment of learning outcomes

Exam form Recommended ratio, %
1 Computer testing 20
2 Written 10
3 Oral 5
4 Project 30
5 Practical 30
6 Comprehensive 5

DEVELOPMENT PLAN

Educational Program 6B06301 «Cyber security»

DEVELOPMENT PLAN

Educational Program 6B06301 «Cyber security»

Course Curriculum

General education courses

Mandatory component

LO13Modern history of Kazakhstan

The course examines the modern history of Kazakhstan as part of the history of mankind, the history of Eurasia and Central Asia. The modern history of Kazakhstan is a period in which a holistic study of historical events, phenomena, facts, processes is carried out, revealing historical patterns that took place on the territory of the Great Steppe in the twentieth century and up to the present day.

LO13Philosophy

The object of study of the discipline is philosophy as a special form of spiritual studies in its cultural and historical development and modern sound. The main directions and problems of world and domestic philosophy are studied. Philosophy is a special form of cognition of the world, creating a system of cognition of the general principles and foundations of human life, about the essential characteristics of a person’s attitude to nature, society and spiritual life, in all its main direction.

LO14Foreign Language (English)

The course includes an intensive English language program focused on grammar and conversational skills. The course includes topics reflecting the latest advances in information technology, and the terminology dictionary makes them directly relevant to the needs of students.

LO14Kazakh (Russian) language

The course occupies a special place in the system of training bachelors with engineering education. For students of a technical university, studying professional Kazakh/Russian languages is not only improving the skills and abilities acquired at school, but also a means of mastering a future specialty.

LO5Information and Communication Technologies (in English)

In the course, information and communication technologies are considered as modern methods and means of communication of people in ordinary and professional activities with the help of information technologies for the search, collection, storage, processing and dissemination of information.

LO13Module of social-political education: Political science

The course is dedicated to general political knowledge for specialties in the field of ICT. It includes political self-awareness, improvement of one’s political outlook and communicative competencies. The teaching of political knowledge is communicative, interactive, student-oriented, result-oriented and largely depends on the independent work of students.

LO13Module of social-political education: Sociology

The course includes knowledge of sociological subject areas, research methods and directions. During the course, the main sociological theories and the most effective ways to gain in-depth knowledge about various aspects of our modern society will be discussed in detail. The special importance of this course for students is to develop the sociological imagination, to understand the basic concepts of sociology as a science.

LO12, LO13Module of social-political education: Psychology

This course presents psychology issues in a broad educational and social context. The knowledge, skills and abilities acquired and formed as a result of mastering the course content give students the opportunity to apply them in practice, in various spheres of life: personal, family, professional, business, social, in working with people – representatives of different social groups and age categories.
The course is also designed to form bachelor’s ideas about the factors that complicate teaching at the present stage of development of society, about the difficulties specific to this activity.

LO12, LO13Module of social-political education: Cultural studies

The course will help to become the basis for the study of the entire complex of social sciences and humanities, as well as a supplement to general courses in history and philosophy. The course includes such topics as morphology, semiotics, anatomy of culture; culture of nomads of Kazakhstan, cultural heritage of Proto-Turks, medieval culture of Central Asia, formation of Kazakh culture, Kazakh culture in the context of globalization, cultural policy of Kazakhstan, etc.

LO15Physical education

The course is devoted to the formation of physical culture of the individual and the ability to direct the use of various means of physical culture to preserve and strengthen health.

General education courses

Elective components

LO7Enterpreneurship

Within the framework of the academic discipline, the student studies the essence of entrepreneurial activity on the basis of the current legislation of the Republic of Kazakhstan. The course will demonstrate the role and place of small enterprises in the modern conditions of the functioning of the economy of the state and society. The discipline will allow to understand the basic principles and content of the business plan of business entities, to form thinking based on modern anti-corruption culture, organizational forms of entrepreneurial activity are explained, including taking into account sustainable development, ecology and safety of personnel.

LO7Technological Entrepreneurship

The discipline introduces students to modern concepts and tools of entrepreneurship and obtaining the theoretical knowledge and practical skills necessary to launch their own startup, taking into account the basics of life safety. On the basis of law and anti-corruption culture, the process of obtaining a patent, the legality of ownership of technological development is being studied, taking into account the legislation of the Republic of Kazakhstan in the field of intellectual property. Students apply strategic analysis in the field of economics, management, communication and technological entrepreneurship.

Profile disciplines

Mandatory components

LO4, LO7, LO11Computer Networks

The course examines the OSI model, basic physical and data link layer protocols, types of equipment, design and configuration of local networks, subnets, etc. As a result of mastering, students will know and understand the principles of operation and design of computer networks, they will master the basic skills of working with the operating systems of network devices of the Linux family to configure them.

LO2, LO8, LO4, LO11Computer Networks Security

This course provides an in-depth, theoretical understanding of network security. The course explains network threats, mitigation techniques, and the basics of securing a network, securing administrative access on Cisco routers, secure administrative access with AAA. During the course, students learn how to implement firewall technologies to secure the network perimeter, configure IPS to mitigate attacks on the network, implement secure virtual private networks and an ASA firewall configuration using the CLI, perform test network security and create a technical security policy.

LO8-LO10Ethical Hacking and Penetration Testing

The course is devoted to the study of methods for analyzing the system for potential vulnerabilities and to create recommendations for eliminating vulnerabilities

LO4, LO7Information Security Risk Management and Compliance

The course aims to familiarize students with modern views and approaches to information security (IS) risk management, disclose the significance of risks for successfully ensuring the information security of an enterprise, explain the main stages of development and implementation of an information security risk management system, familiarize themselves with the main provisions of the leading world standard ISO 27005.

LO1, LO10, LO12Project Management

The academic discipline is aimed at developing the skills of using project management tools at various stages of the project life cycle. The subject of the discipline is the qualitative and quantitative assessment of project risks and the determination of its effectiveness.

LO8, LO8-LO10Research Methods and Tools

The course is designed to study the basic methods and tools required for the introduction of scientific research. The course also introduces students to the most popular searchable databases of scientific articles, such as Web of Science, Scopus, ScienceDirect and others. During the course, students will become familiar with citation and search tools for the required scientific information. Summary of the main sections: empirical research methods (observation, comparison, measurement, experiment); methods of theoretical research (abstraction, analysis and synthesis, idealization, induction and deduction, mental modeling, ascent from the abstract to the concrete, etc.). Learning outcomes: Mastering the skills and competencies required to form a highly qualified specialist according to the purpose and content of the course.

LO1, LO2, LO11, LO12Web security

In this course, students will learn in practice how to conduct a detailed analysis of network resources, software, web resources for vulnerabilities, their exploitation and further elimination. Also, students will get acquainted with the most common attack scenarios. At the end of the course, students will learn the main stages of penetration testing, the use of modern tools for analyzing the security of an information system or application, and the classification of vulnerabilities and methods for fixing them.

LO2, LO3, LO10, LO11Windows System Administration

The course studies the basic principles, methods, and methods of Windows system administration. Students learn server configuration, configuring server roles and functions, configuring Hyper-V, deploying and configuring core network services, installing and administering Active Directory, and creating and managing group policies. They also explore modern file server and storage management technologies, Hyper-V virtualization, disaster recovery in Windows Server, SAN storage and failover cluster management, remote access implementation and performance monitoring in Windows Server.

LO12Industrial practice (2, 3 courses)

Industrial practice gives students the opportunity to get acquainted with the real conditions in industrial enterprises or in business and form an idea of what the work in their chosen profession consists of.

LO12Pre-diploma practice

Pre-diploma practice is intended for the collection, processing and systematization of the material necessary for the completion of the thesis / project.

Profile disciplines

Elective Components

LO4, LO8, LO11Advanced Cryptography

The course covers topics related to the Bitcoin cryptocurrency. It lays out the fundamentals of Bitcoin technologies; how hash functions and digital subscriptions are intertwined; how reliable cryptography and encryption algorithms are; anatomy of transactions; verification and throughput; hard and soft forks. It explains how mining actually happens, how bitcoins are created, how to enter the Bitcoin network and how a digital wallet functions. In addition to basic mathematical education for students enrolled in the educational program «Cybersecurity», as a prerequisite, students are required to have a basic understanding of the basics: databases, computer networks, web servers.

LO1, LO8, LO8Big Data in Law Enforcement 2

The course focuses on the practical application of the MapReduce distributed computing model. For the implementation of the algorithms, a freely distributed set of Hadoop utilities has been selected, which is used to implement search and contextual mechanisms of many highly loaded websites during mass-parallel data processing. Currently, Hadoop is considered one of the fundamental technologies when working with Big Data and is used in many industries: healthcare, telecommunications, trade, logistics, financial companies, as well as in public administration.

Fundamental disciplines

Mandatory components

LO12Academic writing

The discipline is aimed at developing competencies that contribute to the understanding of the rhetorical and semantic aspect of a scientific text, differences in the structures and organization of scientific texts, writing their own scientific texts that meet the requirements adopted in the international scientific community. As a result of studying the discipline, PhD students will learn to use global databases such as Web of Science, Scopus, Elsevier, EBSCO and others. They will also master the use of programs Mendeley, EndNote and others.

LO2, LO8Algorithms and Data Structures

The course covers classical algorithms (search, sorting, etc.) and data structures (queue, stack, tree, graph) used in programming. The principles of algorithm construction, tools for their description, concepts of complexity and performance, and the main classes of algorithms are considered.

LO5, LO12Calculus 1

The academic discipline includes knowledge of analyzing functions represented in a variety of ways, and understanding the relationships between these various representations; understanding the meaning of the derivative in terms of a rate of change and local linear approximation, and using derivatives to solve a variety of problems.

LO5, LO12Calculus 2

The academic discipline acquaints students with important branches of calculus and its applications in computer science. During the educational process, students should become familiar with and be able to apply mathematical methods and tools (ordinary differential equations, series, double and triple integrals) to solve various applied problems.

LO2, LO8, LO7Computer Organization and Architecture

The course is aimed at developing an understanding of the IT architecture as a complex structure that unites all information technologies and resources used by a particular organization or company. The subject of the discipline is information technology infrastructure, the use of software, communication systems, information centers, networks and databases.

LO8, LO10Cryptography

The course outlines the main approaches, methods and algorithms of modern cryptography, as well as formulates the basic concepts of modern cryptography. Much attention is paid to new areas of cryptography related to ensuring the confidentiality of interaction between computer users and computer networks.

LO8, LO10Database Management Systems

This course introduces students to specialised programmes (a set of programmes) designed to organise and maintain databases. The course teaches students how to process information from databases.

LO2-LO5Discrete Mathematics

Discrete mathematics is part of mathematics devoted to the study of discrete objects (here discrete means consisting of separate or unrelated elements). In a more general sense, discrete mathematics is used whenever objects are counted, when relationships between finite (or countable) sets are studied, and when processes involving a finite number of steps are analyzed. The main reason for the growing importance of discrete mathematics is that information is stored and processed by computers in a discrete way.

LO2-LO5Introduction to Cybersecurity

This course provides a broad overview of cybersecurity, including how computers and networks are attacked, how the attackers benefit, and how to mitigate attacks. The types of attacks, vulnerabilities, attackers, and malware are studied along with the introduction of underlying technologies used in cybersecurity. Social engineering, cryptography, and application security are also introduced. The security principles in the CIA triad (data confidentiality, data integrity, and data availability) will be studied during the course.

LO2-LO5Linear Algebra

The course includes: Matrix theory, linear equation systems, vector theory, analytic geometry, limit and differentiation of functions of one variable

LO1, LO12Machine Learning Algorithms

The course goal is to acquire the theoretical and practical knowledge in the field of artificial intelligence in general and in particular in the creating of algorithms capable of learning. The course examines the basic machine learning algorithms, various approaches and technologies for data analysis, their qualities, features and impact in various fields of science and technology. As an outcome of mastering the course, students will be able to apply machine learning methods to visualize their data, build graphs, and present the results qualitatively.

LO1-LO3, LO5Operating System Concepts

The course develops students’ knowledge of the basic mechanisms and devices of operational systems, the specifics of their interaction with the hardware of a computer, and introduces them to the principles of system programming at the level of Linux operating systems.

LO4Operating Systems Security

This course provides an in-depth examination of issues in operating system security. The course studies features and characteristics of the Linux and Windows Operating Systems with a focus on the design of authorization systems and thorough examination of the operation of network protocols and services. Students will study how to prevent malicious access to endpoint hosts and data and how to investigate endpoint vulnerabilities and attacks.

LO2-LO5Probability and Statistics

The course teaches the study of patterns of random phenomena and their properties, and use them for data analysis. As a result of studying this discipline, students will know the basic concepts of probability theory and mathematical statistics and their properties and be able to use probabilistic models for solving problems, work with random variables, calculate sample characteristics, evaluate the reliability of statistical data.

LO1-LO3, LO5Professional English language

The course includes an intensive program of learning English related to professional activities. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.

LO4, LO5, LO8, LO8Web technologies 1 (Front End)

The course teaches you to use the PHP programming language, master the fundamentals of the MySQL database and develop secure server-side client web applications.

LO12Educational practice

The course is designed to study the basics of information security in practice.

Fundamental disciplines

Elective components

LO1, LO5Advanced Programming 1 (Python)

The course is intended for a more advanced study of the Java or Python programming language, including the study of JSP (Java Server Pages), Servlet, JDBC (Java Database connection), including many basic principles of Java to Enterprise Edition (Advanced Java EE).Exception Handling, Generics, Delegates, Events, Lambda Expressions, Extensions Methods, LINQ, Nullable Types, Dynamics, Asynchronous Programming with Async / Await, and other topics.

LO1, LO8Big Data in Law Enforcement 1

In this course the possibilities of a legal attack on various web resources will be considered. As part of this course, students will learn how to find vulnerabilities and exploit them. Security bypass methods, the TCP/IP network protocol, Windows internals, and the Python programming language will also be covered.

LO5Blockchain practices

This course examines the principles, methods and means of blockchain technology to ensure the protection of information, countering threats to information security. The principles of using a replicated distributed database of blocks to ensure information security and the use of the blockchain network in various fields are also considered.

LO8, LO10Computer Viruses and Malware

In this course, students are introduced to processor modes, memory organization, service programming, file packing and unpacking techniques, disassembly and debugging tools and code analysis techniques. At the end of the course, students will understand how the compiled code works, master the skills of examining files for vulnerabilities, learn how to research malware and write down reports based on the results of the research.

LO5Database Programming 1 (PL/SQL)

The basic principles of programming a database system (PL / SQL) are given. The basic data models, database design, structured query language are considered. The architecture of the database system, the stages of database design, programming triggers, procedures, relationships, updating, restoration and management of the database management system are studied.

LO8, LO8, LO10, LO11Hacking Lab

The course is in the format of training on information security for students.Studemts use a game approach, practical exercises, simulated attacks and other interactive techniques. This allows students to form sustainable habits and strengthen cybersecurity in the long term.

LO4, LO8Innovation Lab

The course is designed for students to complete a project after the first year of study, a ready-made minimum product that they can present at various competitions (hackathons). The course does not imply the presence of a lecture, and all classes will be practice-oriented, with the maximum emphasis on obtaining the results of the finished product. During the course, students must apply all the knowledge gained in the first year, including knowledge of developing ready-made applications. A great emphasis on this course is given to the quality business component of the minimum product.

LO4, LO8Introduction to Digital Forensics

In this course, students are introduced to the basics of digital forensics. Students will learn the nature of digital footprints, which requires the use of new forensic tools, new standards of objectivity, verification, validation, and evaluation of evidence, as well as relevant experts. In this course, students will learn how to find webshells, find traces of an intruder, attack algorithms and write a report.

LO4Introduction to Programming (C++)

The course is designed to study programming, debugging and implementation of tasks. The principles of the operation of network technologies, access to local and remote network resources, programs using the C ++ language are analyzed.

LO4Introduction to Programming (Python)

The course is designed to explore the basics of programming, debugging, and software implementation. The course also analyzes how networking technologies and programs work using the Python programming language.

LO2-LO8Object-Oriented programming (Java)

The course is designed to learn the basic concepts of object-oriented programming in Java.

LO2-LO8Object-Oriented Programming (Python)

The course is designed to study object-oriented programming inPython. Students will study the principles of object-oriented programming, additional elements of the Python language (classes, objects, templates, etc.), receive the concepts of object-oriented programming (polymorphism, encapsulation, inheritance, constructor, etc.), form understanding of the principle of code reuse in programming.

How to proceed

Educational programs

Students life

Infrastructure

https://ejournal.unperba.ac.id/pages/uploads/sv388/ https://ejournal.unperba.ac.id/pages/uploads/ladangtoto/ https://poltekkespangkalpinang.ac.id/public/assets/scatter-hitam/ https://poltekkespangkalpinang.ac.id/public/assets/blog/sv388/ https://poltekkespangkalpinang.ac.id/public/uploads/depo-5k/ https://smpn9prob.sch.id/content/luckybet89/