Cybersecurity

Cybersecurity

6B06301

Educational program «Cyber security» (Cybersecurity) includes work on information security, Mr. of Independent and objective assessment of the current level of protection of computer systems and networks, by identifying existing security problems, for the design and development of software systems, information security of organizations and enterprises. The program will help develop skills in software development, as well as in technologies for protecting information and objects of informatization, ensuring the integrity of information and analyzing the security of systems.

The goal of the EP

Training of highly qualified personnel with Applied mi knowledge mi integrity, confidentiality, availability of data, existing methods of design and support computer networks, security issues related to the operation of local and global networks.

Objectives of the EP

  • Ensuring the protection of information and objects of informatization using standards and protocols of network interaction.
  • Monitoring, analysis and comparison of the effectiveness of software and hardware information protection in operating systems and networks.
  • Carrying out the correctness of the administration of the system and software and hardware protection.
  • Conduct continuous monitoring and warning light of information security, threat detection, vulnerability, risks in Internet security affairs.
  • Development, design and maintenance of network security tools of the organization.
  • Assessment of the security level of computer systems and networks of the organization and the preparation of supporting documentation.

6B06 - Information and Communication Technologies

Education code and classification

058 - Information Security

Education Programs Group

061 - Information and Communication Technologies

Code and classification of training directions

Requirements for evaluating the learning outcomes of the educational program

A student, after mastering the entire educational program, must be able to fulfill the following points:
  • Formulate and solve problems arising in the course of production activities that require in-depth professional knowledge.
  • To formulate the problem, both mathematical approaches and computer tools can be used;
  • Choose the necessary approaches and methods for analyzing problems, as well as modify existing ones and develop new ones, depending on the tasks of a particular case;
  • To apply in the process of training psychological methods and means of increasing the effectiveness and quality of training;
  • Proficient in a foreign (English) language, allowing students to conduct research at a high-quality level and to teach special disciplines in universities;
  • To model and design complex systems using mathematical and computer models and methods;
  • Apply quantitative and qualitative methods and techniques for collecting primary information for research, as well as developing effective solutions to problems;
  • Analyze and design software tools for data analysis, as well as the algorithms, models and methods required for developing software systems, effective data analysis and extracting knowledge from data;
  • Manage a team of developers in the process of developing software systems, as well as models and methods of data analysis;
  • Choose standards, methods, technologies, tools and technical means for carrying out work on further maintenance of software systems;
  • Apply methods of design and development of software systems to solve a wide class of applied problems in various fields, including interdisciplinary industries;
  • Program and test various solutions (models, methods), take part in the creation and management of systems at all stages of the life cycle of system development.
  • Create relational and non-relational databases for the effective storage and management of data in various large organizations, government agencies and other companies.
  • Create analysis models for structured, semi-structured and partially unstructured data.
  • To analyze the complexity of calculations and the possibility of parallelization (optimization) of the developed algorithms and programs.
  • Assess the main parameters of the resulting parallel programs, such as numerical indicators of the required computing resources, acceleration, efficiency and scalability.

The list of competencies and the results of the educational program

The list of competencies of the educational program

OK1. The ability to understand the driving forces and patterns of the historical process, the place of a person in the historical process and the ability to understand philosophy as a methodology of human activity, readiness for self-knowledge, initiative, development of cultural wealth as a factor in harmonizing personal and interpersonal relationships
OK2. The ability to form and develop skills and competencies in the field of organization, planning and production management, the ability to apply the acquired knowledge to comprehend the surrounding environmental reality, the ability to summarize, analyze, predict when setting goals in the professional field and choose ways to achieve them using the scientific research methodology
OK3. Ability for written and oral communication in the state language and the language of interethnic communication, as well as in a foreign (English) language. The ability to use foreign sources of information, to have communication skills, to public speaking, argumentation, conducting discussions and polemics in a foreign language
OK4. The ability to be competent in the choice of ICT and mathematical modeling methods for solving specific engineering problems, the ability to be ready to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it
PC1. The ability to understand modern standards, regulatory framework, the basics of economic knowledge, scientific ideas about project management and technological entrepreneurship.
PC2. The ability to professionally use modern computer equipment, network components, computer programs and complex computing systems (in accordance with the objectives of the program), as well as use the safety rules, industrial sanitation, fire safety and labor protection standards.
PC3. The ability to possess the skills of using and applying algorithms, data structures and modern methods for creating (developing) and further supporting various software systems for analyzing big data.
PC4. The ability to use the basic principles and methods for solving managerial problems, the ability to execute project documentation in a software environment using computer graphics for various types of projects.
PC5. The ability to be competent in the choice of mathematical modeling methods for solving specific applied problems in big data analysis, including the willingness to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it.
PC6. The ability to design the architectures of components of information systems, including the human-machine interface of hardware and software systems, and to select operating systems and information protection methods.
PC7. Ability to develop information and information system software based on modern development methods and tools.
PC8. Ability to collect, process and analyze data using the organization’s methodological and technological infrastructure.
PC9. The ability to manage the life cycle stages of the methodological and technological infrastructure of software development, data analysis, design of IT infrastructure in various organizations.
PC10. The ability to use modern programming environments for the design and implementation of software solutions and databases for information and communication technologies.
PС11. The ability to apply the elements of probability theory and mathematical statistics that underlie the models and methods of data science, to choose the right methods of data analysis, machine learning and artificial intelligence to solve practical problems.
PС12. The ability to develop and implement safe and testable solutions based on new methods and technologies for information security, used when working with information and communication technologies.

Learning Outcomes

LO1. Explain and understand the regulatory framework, including documents, standardization and certification procedures in the development of information and communication technologies.
LO2. Apply domestic and foreign standards for software development in organizations.
LO3. Apply practical programming skills and explain the general methodological foundations of program development, create system programs for various levels of computer systems and software architecture, including low-level programming and microcontroller programming.
LO4. Demonstrate knowledge of the architecture of computer systems, manage operating systems.
LO5. Implement basic network communication between devices, calculate and apply addressing schemes, configure and configure network devices required to ensure the functionality of information and communication technologies.
LO6. Apply project management tools at various stages of the project life cycle, make a qualitative and quantitative assessment of project risks, determine the effectiveness of the project.
LO7. Apply mathematical tools to analyze software systems and data based on statistical and probabilistic models.
LO8. Apply hardware and software services to ensure the continuity of the process of developing software systems.
LO9. Independently analyze modern sources, draw conclusions, argue them and make decisions based on information.
LO10. Develop secure server-side web client applications and mobile applications.

Assessment of learning outcomes

Exam form Recommended ratio, %
1 Computer testing 20
2 Written 10
3 Oral 5
4 Project 30
5 Practical 30
6 Comprehensive 5

GRADUATE MODEL

«ASTANA IT UNIVERSITY»

Bachelor of Educational Programme 6B06301 «Cyber security»

GRADUATE MODEL

«ASTANA IT UNIVERSITY»

Bachelor of Educational Programme 6B06301 «Cyber security»

DEVELOPMENT PLAN

Educational Program 6B06301 «Cyber security»

DEVELOPMENT PLAN

Educational Program 6B06301 «Cyber security»

Course Curriculum

The cycle of general education disciplines

Mandatory component

OK1Modern history of Kazakhstan

The course considers the modern history of Kazakhstan, how part of the history of mankind, the history of Eurasia and Central Asia. The modern history of Kazakhstan is a period in which a holistic study of historical events, phenomena, facts, processes is carried out, the identification of historical patterns that took place on the territory of the Great Steppe in the twentieth century and to this day.

OK1Philosophy

The course involves the study of the discipline of philosophy as a special form of spiritual studies in its cultural and historical development and modern sound. The main directions and problems of world and national philosophy are studied. Philosophy is a special form of cognition of the world, creating a system of cognition of the general principles and foundations of human life, about the essential characteristics of a person’s relationship to nature, society and spiritual life, in all its main direction.

OK3Foreign Language (English)

The course includes an intensive English language study program focused on grammar and speaking skills. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.

OK3Kazakh (Russian) language

The course occupies a special place in the system of training bachelors with an engineering education. For students of a technical university, the study of professional Kazakh / Russian languages is not only an improvement of the skills acquired in the school, but also a means of mastering the future specialty.

ОК4, PC1, PC2Information and Communication Technologies (in English)

The course includes the study of modern information technologies, including methods and means of communication of people in ordinary and professional activities using information technology. Technology data is studied in relation to the search, collection, storage, processing and dissemination of information.

OK1Module of social-political education: Political science

The course is devoted to general political knowledge for specialties in the field of information technology. The course includes political self-awareness, improving one’s political outlook and communicative competencies. Teaching political knowledge is communicative, interactive, student-oriented, result-oriented, and largely depends on the independent work of students.

OK1Module of social-political education: Sociology

The course includes knowledge of sociological subject areas, research methods and directions. The course will discuss in detail the basic sociological theories and the most effective ways of gaining deep knowledge about various aspects of our modern society. The special significance of this course for students is the opportunity to develop a sociological imagination, to understand the basic concepts of sociology as a science.

OK1Module of social-political education: Psychology

The course presents questions of psychology in a wide educational and social context. The knowledge and skills acquired and formed as a result of mastering the course content give students the opportunity to put them into practice in various areas of life: personal, family, professional, business, social, in working with people from different social groups and age groups.

OK1Module of social-political education: Cultural studies

The course will help to become the basis for studying the whole complex of social and human sciences, as well as an addition to general courses in history and philosophy. The course includes topics such as morphology, semiotics, anatomy of culture; the culture of the nomads of Kazakhstan, the cultural heritage of the proto-Turks, the medieval culture of Central Asia, the formation of the Kazakh culture, the Kazakh culture in the context of globalization, the cultural policy of Kazakhstan, etc.

Physical Culture

The course is devoted to the formation of physical culture of a person and the ability to use various means of physical culture in a targeted way to preserve and health promotion.

The cycle of general education disciplines

University component

ОK2, PC1, PC9Technological entrepreneurship

The course is devoted to the study of the principles and methods of building an organization, planning and control at an enterprise, economic analysis of the production process and evaluation of its results, organization and control of the production process. The course examines the entrepreneurial skills and leadership qualities required to successfully become an IT entrepreneur.

Cycle of profiling disciplines

University component

PC1Project management

To be able to use project management tools at various stages of the project life cycle, to make a qualitative and quantitative assessment of project risks, to determine project effectiveness.

PC3, PC6Introduction to Cybersecurity

To study the principles of construction, types and functions of operating systems and their protection system.

PC4Advanced Java 1 / C # 1

The course is aimed at those people who are already familiar with the Java programming language and would like to deepen their knowledge and study the advanced topics of this programming language. The course explains in detail and in detail the most important topics of Java and programming in general, which are necessary for working in the industry.

PC4Hacking competition. Project

The course represents participation in competitions of hackers and experienced experts in the field of information security. Here they break a variety of things, ranging from browsers to macbooks, and as trophies they take home not only cash prizes, but also those devices that they managed to crack.

PC4Undergraduate practice

The course is designed to learn the basics of information security in practice.

PC9Ethical Hacking and Penetration Testing

The course is devoted to the study of methods for analyzing the system for potential vulnerabilities and to create recommendations for eliminating vulnerabilities

PC7Cryptography

The course outlines the main approaches, methods and algorithms of modern cryptography, as well as formulates the basic concepts of modern cryptography. Much attention is paid to new areas of cryptography related to ensuring the confidentiality of interaction between computer users and computer networks.

PC8Industrial Practice (2.3 year)

The course is devoted to the study of information security technologies.

Cycle of profiling disciplines

Component by choice

PC5Operating Systems Security

The course is devoted to the study of the principles of construction, types and functions of operating systems and their protection system.

PC5Computer Network Security

In this course, the student studies the main and auxiliary network tools and services for network security.

PC5Biometric Access Control Systems

The aim of this course is to study methods of preventing and penetrating intruders into protected areas and into premises through forgery, theft of documents, cards, passwords. The student will learn to limit access to information and ensure personal responsibility for its safety, as well as provide access to responsible objects only certified specialists.

PC9Hacking and protecting systems

The course explores exactly how to find vulnerabilities in software. The topic is especially relevant, since more and more attention is currently being paid to the computer software industry .

PC9Firewalls and Network Security

The purpose of this course is an in-depth practical study of the use of firewalls to protect corporate networks.

PC7Elective 4

Course from the catalog of elective disciplines

PC7Coding Theory and Cryptography

The special course taught to fourth-year students should have the following objectives. 1. To introduce readers to those areas of arithmetic, both classical and the most modern, that are in the center of attention of applications of number theory, especially cryptography. It is assumed that knowledge of higher algebra and number theory is limited to the most modest acquaintance with their foundations; for this reason, necessary information from these areas of mathematics is also presented. The authors chose an algorithmic approach, with particular attention being paid to evaluating the effectiveness of the methods proposed by the theory. 2. To acquaint students with the main achievements of the theory of error-correcting coding: existing restrictions and basic linear codes: Hamming, BCH, Reed-Muller, Reed-Solomon. 3. Considerable attention is paid to the study of the widely used cryptographic algorithms of symmetric and asymmetric encryption, as well as cryptographic hash functions.

PC8Elective 2

Course from the catalog of elective disciplines

PC8Corporate cybersecurity

This course teaches you how to use special techniques, methods and tools of corporate cybersecurity.

Cycle of basic disciplines

University component

ОК4, PC5Algebra and geometry

The course involves the study of the foundations of algebra and geometry at the university level and includes matrix theory, linear equations systems, vector theory, analytical geometry, limit and differentiation of functions of one variable

ОК4, PC3Mathematical analysis 1,2

The course introduces students to the important branches of calculus and its applications in computer science. During the educational process, students should become familiar with and be able to apply mathematical methods and tools to solve various applied problems. Moreover, they will study the fundamental methods of studying infinitesimal variables using analysis, the basis of which is the theory of differential and integral calculations.

ОК4, PC4Discrete mathematics

The course is part of mathematics devoted to the study of discrete objects (here discrete means consisting of separate or unrelated elements). In a more general sense, discrete mathematics is used whenever objects are counted, when relationships between finite (or countable) sets are studied, and when processes involving a finite number of steps are analyzed. The main reason for the growing importance of discrete mathematics is that information is stored and processed by computers in a discrete way.

PC3Algorithms and Data Structures

The course is designed to study algorithms and data structure for solving various applied problems. For this, the program structure, the principles of constructing algorithms and programs, methods for solving, algorithms, and programming are considered.

ОК4, PC5, PC11Theory of Probability and Mathematical Statistics

The course is devoted to the probability and statistics of any events, as well as the relationship between mathematics and programming, operating systems as part of an interdisciplinary training program covering the section of mathematical analysis, modern statistical methods and economic theory.

OK3Professional English

The course includes an intensive, more advanced program for studying academic and applied (information technology) English, oriented professional skills in professional speaking and understanding of common terminology. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.

PC8Information Security Risk Management and Compliance

The course aims to familiarize students with modern views and approaches to information security (IS) risk management, disclose the significance of risks for successfully ensuring the information security of an enterprise, explain the main stages of development and implementation of an information security risk management system, familiarize themselves with the main provisions of the leading world standard ISO 27005

PC8Research Methods and Tools

To form a general idea of students about the basic approaches and methods of conducting independent research. The main attention is paid to such stages of the study preparation as highlighting the problem, formulating a scientific hypothesis, choosing methods for testing and verifying the hypothesis.

PC8Web technologies

The course teaches you to use the PHP programming language (and other languages), to master the basics of the MySQL database (and others) and to develop secure server-side client web applications.

Cycle of basic disciplines

Component by choice

PC5Fundamentals of programming С++

The course is designed to explore programming, debugging, and task implementation. During the course, the principles of networking technologies, access to local and remote network resources, programs using the language of Care licked.

PO11Object oriented programming

The course is designed for students to teach them how to write applications using an object-oriented approach.

PC2Object oriented programming Java

Brief description of the discipline: The course is designed to learn the basics of programming, debugging and implementation of software systems. The course also analyzes the principles of network technologies and programs using the Java programming language.
Summary of the main sections: Classes and objects, Abstraction, Encapsulation, Inheritance, Polymorphism and other principles of object-oriented programming
Learning outcomes: Mastering the skills and competencies required to form a highly qualified specialist according to the purpose and content of the course.

PC2Computer Organization and Architecture

The course is aimed at studying the principles of operation of modern microprocessor technology that underlies universal and specialized computers, and embedded systems, methods for organizing the interaction of a microprocessor with memory and external devices. In the process of studying the course, students should get an idea about the features of the internal structure of a modern microprocessor.

PC2Software architecture

The course addresses the development of innovative approaches to creating and documenting software architecture. The course aims to highlight the existing approaches to the documentation of architectural design, build the relationship between functional objects used as units of architecture, show how they affect the final result of the company’s activities, identify “external” events that also affect, and sometimes determine, the software architecture providing enterprises and recommend the development directions of already existing architectures.

PC5Computer Network 1

The course is intended for network engineers who are ready to improve their skills and to work independently with complex network solutions. The course teaches you to plan, configure and verify the operation of corporate LAN and WAN networks using various routing protocols.

PC5Testing Network Applications

The course is designed to learn the basics of testing network applications, including testing the congestion of information transmission channels to achieve optimal results.

PC7DBMS (Database Management Systems)

The course provides knowledge and skills in database design, starting from the conceptual stage and ending with physical implementation.

PC7DBMS (Database Management Systems) Oracle

The course provides knowledge and skills in database design, starting from the conceptual stage and ending with physical implementation using SQL – ORACLE.

PC4Introduction to the Web

This course teaches the basics of website layout using HTML, Cascading Style Sheets (CSS ), JavaScript . And also the course includes a framework – Boostrap 4.

PC4Mobile applications

This course is designed to learn the basics of mobile development using the development environment for the Android / IOS operating system. Mobile applications received as a result of the course can be downloaded to the university repositories and also exhibited in the Play Store / Apple Store.

PC4Python

The course teaches you to use data structures, functions, modules, classes and learn programming technology in Python.

PC4Ruby programming language

The course is designed to acquire the necessary knowledge, skills and abilities for creating various web applications using the Ruby programming language.

PC8Elective 1

Course from the catalog of elective disciplines

PC8Elective 3

Course from the catalog of elective disciplines

PC8Management Communication

The course is focused on the formation of a systematic approach to managing communications in the project. Students will become familiar with communication management processes, mastering modern methods and techniques of working with information. In the process, practical steps will be considered to create an optimal information exchange system with project participants.

PC8Mastering Design Thinking

The course involves the creation of business ideas using design thinking. Students will see the customer’s problem, come up with several solutions and scale the best of them to the entire market. The course will help to understand the needs of customers – even those that they are not aware of; come up with some ideas on how to meet these needs; prototype and test ideas at no cost; select a solution, invest in it and know that customers need it.

PC8Network Security (Cisco CCNA Cyber Ops)

The focus is on monitoring, detection, and response to cyber security threats. The following topics are also considered: cryptography, host security analysis, security monitoring, computer-technical expertise, attack methods, response to information security incidents and notification of them.

PC8Networks application architecture

The course prepares students for a professional certification exam and involves preparing network application administrators for the design of various network services.

PC8Undergraduate practice

The course presents the collection and analysis of materials for writing a graduation project.