Educational program «Cyber security» (Cybersecurity) includes work on information security, Mr. of Independent and objective assessment of the current level of protection of computer systems and networks, by identifying existing security problems, for the design and development of software systems, information security of organizations and enterprises. The program will help develop skills in software development, as well as in technologies for protecting information and objects of informatization, ensuring the integrity of information and analyzing the security of systems.
The goal of the EP
Training of highly qualified personnel with Applied mi knowledge mi integrity, confidentiality, availability of data, existing methods of design and support computer networks, security issues related to the operation of local and global networks.
Objectives of the EP
OK1. The ability to understand the driving forces and patterns of the historical process, the place of a person in the historical process and the ability to understand philosophy as a methodology of human activity, readiness for self-knowledge, initiative, development of cultural wealth as a factor in harmonizing personal and interpersonal relationships
OK2. The ability to form and develop skills and competencies in the field of organization, planning and production management, the ability to apply the acquired knowledge to comprehend the surrounding environmental reality, the ability to summarize, analyze, predict when setting goals in the professional field and choose ways to achieve them using the scientific research methodology
OK3. Ability for written and oral communication in the state language and the language of interethnic communication, as well as in a foreign (English) language. The ability to use foreign sources of information, to have communication skills, to public speaking, argumentation, conducting discussions and polemics in a foreign language
OK4. The ability to be competent in the choice of ICT and mathematical modeling methods for solving specific engineering problems, the ability to be ready to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it
PC1. The ability to understand modern standards, regulatory framework, the basics of economic knowledge, scientific ideas about project management and technological entrepreneurship.
PC2. The ability to professionally use modern computer equipment, network components, computer programs and complex computing systems (in accordance with the objectives of the program), as well as use the safety rules, industrial sanitation, fire safety and labor protection standards.
PC3. The ability to possess the skills of using and applying algorithms, data structures and modern methods for creating (developing) and further supporting various software systems for analyzing big data.
PC4. The ability to use the basic principles and methods for solving managerial problems, the ability to execute project documentation in a software environment using computer graphics for various types of projects.
PC5. The ability to be competent in the choice of mathematical modeling methods for solving specific applied problems in big data analysis, including the willingness to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it.
PC6. The ability to design the architectures of components of information systems, including the human-machine interface of hardware and software systems, and to select operating systems and information protection methods.
PC7. Ability to develop information and information system software based on modern development methods and tools.
PC8. Ability to collect, process and analyze data using the organization’s methodological and technological infrastructure.
PC9. The ability to manage the life cycle stages of the methodological and technological infrastructure of software development, data analysis, design of IT infrastructure in various organizations.
PC10. The ability to use modern programming environments for the design and implementation of software solutions and databases for information and communication technologies.
PС11. The ability to apply the elements of probability theory and mathematical statistics that underlie the models and methods of data science, to choose the right methods of data analysis, machine learning and artificial intelligence to solve practical problems.
PС12. The ability to develop and implement safe and testable solutions based on new methods and technologies for information security, used when working with information and communication technologies.
LO1. Explain and understand the regulatory framework, including documents, standardization and certification procedures in the development of information and communication technologies.
LO2. Apply domestic and foreign standards for software development in organizations.
LO3. Apply practical programming skills and explain the general methodological foundations of program development, create system programs for various levels of computer systems and software architecture, including low-level programming and microcontroller programming.
LO4. Demonstrate knowledge of the architecture of computer systems, manage operating systems.
LO5. Implement basic network communication between devices, calculate and apply addressing schemes, configure and configure network devices required to ensure the functionality of information and communication technologies.
LO6. Apply project management tools at various stages of the project life cycle, make a qualitative and quantitative assessment of project risks, determine the effectiveness of the project.
LO7. Apply mathematical tools to analyze software systems and data based on statistical and probabilistic models.
LO8. Apply hardware and software services to ensure the continuity of the process of developing software systems.
LO9. Independently analyze modern sources, draw conclusions, argue them and make decisions based on information.
LO10. Develop secure server-side web client applications and mobile applications.
|№||Exam form||Recommended ratio, %|
The course considers the modern history of Kazakhstan, how part of the history of mankind, the history of Eurasia and Central Asia. The modern history of Kazakhstan is a period in which a holistic study of historical events, phenomena, facts, processes is carried out, the identification of historical patterns that took place on the territory of the Great Steppe in the twentieth century and to this day.
The course involves the study of the discipline of philosophy as a special form of spiritual studies in its cultural and historical development and modern sound. The main directions and problems of world and national philosophy are studied. Philosophy is a special form of cognition of the world, creating a system of cognition of the general principles and foundations of human life, about the essential characteristics of a person’s relationship to nature, society and spiritual life, in all its main direction.
The course includes an intensive English language study program focused on grammar and speaking skills. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.
The course occupies a special place in the system of training bachelors with an engineering education. For students of a technical university, the study of professional Kazakh / Russian languages is not only an improvement of the skills acquired in the school, but also a means of mastering the future specialty.
The course includes the study of modern information technologies, including methods and means of communication of people in ordinary and professional activities using information technology. Technology data is studied in relation to the search, collection, storage, processing and dissemination of information.
The course is devoted to general political knowledge for specialties in the field of information technology. The course includes political self-awareness, improving one’s political outlook and communicative competencies. Teaching political knowledge is communicative, interactive, student-oriented, result-oriented, and largely depends on the independent work of students.
The course includes knowledge of sociological subject areas, research methods and directions. The course will discuss in detail the basic sociological theories and the most effective ways of gaining deep knowledge about various aspects of our modern society. The special significance of this course for students is the opportunity to develop a sociological imagination, to understand the basic concepts of sociology as a science.
The course presents questions of psychology in a wide educational and social context. The knowledge and skills acquired and formed as a result of mastering the course content give students the opportunity to put them into practice in various areas of life: personal, family, professional, business, social, in working with people from different social groups and age groups.
The course will help to become the basis for studying the whole complex of social and human sciences, as well as an addition to general courses in history and philosophy. The course includes topics such as morphology, semiotics, anatomy of culture; the culture of the nomads of Kazakhstan, the cultural heritage of the proto-Turks, the medieval culture of Central Asia, the formation of the Kazakh culture, the Kazakh culture in the context of globalization, the cultural policy of Kazakhstan, etc.
The course is devoted to the formation of physical culture of a person and the ability to use various means of physical culture in a targeted way to preserve and health promotion.
The course is devoted to the study of the principles and methods of building an organization, planning and control at an enterprise, economic analysis of the production process and evaluation of its results, organization and control of the production process. The course examines the entrepreneurial skills and leadership qualities required to successfully become an IT entrepreneur.
To be able to use project management tools at various stages of the project life cycle, to make a qualitative and quantitative assessment of project risks, to determine project effectiveness.
To study the principles of construction, types and functions of operating systems and their protection system.
The course is aimed at those people who are already familiar with the Java programming language and would like to deepen their knowledge and study the advanced topics of this programming language. The course explains in detail and in detail the most important topics of Java and programming in general, which are necessary for working in the industry.
The course represents participation in competitions of hackers and experienced experts in the field of information security. Here they break a variety of things, ranging from browsers to macbooks, and as trophies they take home not only cash prizes, but also those devices that they managed to crack.
The course is designed to learn the basics of information security in practice.
The course is devoted to the study of methods for analyzing the system for potential vulnerabilities and to create recommendations for eliminating vulnerabilities
The course outlines the main approaches, methods and algorithms of modern cryptography, as well as formulates the basic concepts of modern cryptography. Much attention is paid to new areas of cryptography related to ensuring the confidentiality of interaction between computer users and computer networks.
The course is devoted to the study of information security technologies.
The course is devoted to the study of the principles of construction, types and functions of operating systems and their protection system.
In this course, the student studies the main and auxiliary network tools and services for network security.
The aim of this course is to study methods of preventing and penetrating intruders into protected areas and into premises through forgery, theft of documents, cards, passwords. The student will learn to limit access to information and ensure personal responsibility for its safety, as well as provide access to responsible objects only certified specialists.
The course explores exactly how to find vulnerabilities in software. The topic is especially relevant, since more and more attention is currently being paid to the computer software industry .
The purpose of this course is an in-depth practical study of the use of firewalls to protect corporate networks.
Course from the catalog of elective disciplines
The special course taught to fourth-year students should have the following objectives. 1. To introduce readers to those areas of arithmetic, both classical and the most modern, that are in the center of attention of applications of number theory, especially cryptography. It is assumed that knowledge of higher algebra and number theory is limited to the most modest acquaintance with their foundations; for this reason, necessary information from these areas of mathematics is also presented. The authors chose an algorithmic approach, with particular attention being paid to evaluating the effectiveness of the methods proposed by the theory. 2. To acquaint students with the main achievements of the theory of error-correcting coding: existing restrictions and basic linear codes: Hamming, BCH, Reed-Muller, Reed-Solomon. 3. Considerable attention is paid to the study of the widely used cryptographic algorithms of symmetric and asymmetric encryption, as well as cryptographic hash functions.
Course from the catalog of elective disciplines
This course teaches you how to use special techniques, methods and tools of corporate cybersecurity.
The course involves the study of the foundations of algebra and geometry at the university level and includes matrix theory, linear equations systems, vector theory, analytical geometry, limit and differentiation of functions of one variable
The course introduces students to the important branches of calculus and its applications in computer science. During the educational process, students should become familiar with and be able to apply mathematical methods and tools to solve various applied problems. Moreover, they will study the fundamental methods of studying infinitesimal variables using analysis, the basis of which is the theory of differential and integral calculations.
The course is part of mathematics devoted to the study of discrete objects (here discrete means consisting of separate or unrelated elements). In a more general sense, discrete mathematics is used whenever objects are counted, when relationships between finite (or countable) sets are studied, and when processes involving a finite number of steps are analyzed. The main reason for the growing importance of discrete mathematics is that information is stored and processed by computers in a discrete way.
The course is designed to study algorithms and data structure for solving various applied problems. For this, the program structure, the principles of constructing algorithms and programs, methods for solving, algorithms, and programming are considered.
The course is devoted to the probability and statistics of any events, as well as the relationship between mathematics and programming, operating systems as part of an interdisciplinary training program covering the section of mathematical analysis, modern statistical methods and economic theory.
The course includes an intensive, more advanced program for studying academic and applied (information technology) English, oriented professional skills in professional speaking and understanding of common terminology. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.
The course aims to familiarize students with modern views and approaches to information security (IS) risk management, disclose the significance of risks for successfully ensuring the information security of an enterprise, explain the main stages of development and implementation of an information security risk management system, familiarize themselves with the main provisions of the leading world standard ISO 27005
To form a general idea of students about the basic approaches and methods of conducting independent research. The main attention is paid to such stages of the study preparation as highlighting the problem, formulating a scientific hypothesis, choosing methods for testing and verifying the hypothesis.
The course teaches you to use the PHP programming language (and other languages), to master the basics of the MySQL database (and others) and to develop secure server-side client web applications.
The course is designed to explore programming, debugging, and task implementation. During the course, the principles of networking technologies, access to local and remote network resources, programs using the language of Care licked.
The course is designed for students to teach them how to write applications using an object-oriented approach.
Brief description of the discipline: The course is designed to learn the basics of programming, debugging and implementation of software systems. The course also analyzes the principles of network technologies and programs using the Java programming language.
Summary of the main sections: Classes and objects, Abstraction, Encapsulation, Inheritance, Polymorphism and other principles of object-oriented programming
Learning outcomes: Mastering the skills and competencies required to form a highly qualified specialist according to the purpose and content of the course.
The course is aimed at studying the principles of operation of modern microprocessor technology that underlies universal and specialized computers, and embedded systems, methods for organizing the interaction of a microprocessor with memory and external devices. In the process of studying the course, students should get an idea about the features of the internal structure of a modern microprocessor.
The course addresses the development of innovative approaches to creating and documenting software architecture. The course aims to highlight the existing approaches to the documentation of architectural design, build the relationship between functional objects used as units of architecture, show how they affect the final result of the company’s activities, identify “external” events that also affect, and sometimes determine, the software architecture providing enterprises and recommend the development directions of already existing architectures.
The course is intended for network engineers who are ready to improve their skills and to work independently with complex network solutions. The course teaches you to plan, configure and verify the operation of corporate LAN and WAN networks using various routing protocols.
The course is designed to learn the basics of testing network applications, including testing the congestion of information transmission channels to achieve optimal results.
The course provides knowledge and skills in database design, starting from the conceptual stage and ending with physical implementation.
The course provides knowledge and skills in database design, starting from the conceptual stage and ending with physical implementation using SQL – ORACLE.
This course is designed to learn the basics of mobile development using the development environment for the Android / IOS operating system. Mobile applications received as a result of the course can be downloaded to the university repositories and also exhibited in the Play Store / Apple Store.
The course teaches you to use data structures, functions, modules, classes and learn programming technology in Python.
The course is designed to acquire the necessary knowledge, skills and abilities for creating various web applications using the Ruby programming language.
Course from the catalog of elective disciplines
Course from the catalog of elective disciplines
The course is focused on the formation of a systematic approach to managing communications in the project. Students will become familiar with communication management processes, mastering modern methods and techniques of working with information. In the process, practical steps will be considered to create an optimal information exchange system with project participants.
The course involves the creation of business ideas using design thinking. Students will see the customer’s problem, come up with several solutions and scale the best of them to the entire market. The course will help to understand the needs of customers – even those that they are not aware of; come up with some ideas on how to meet these needs; prototype and test ideas at no cost; select a solution, invest in it and know that customers need it.
The focus is on monitoring, detection, and response to cyber security threats. The following topics are also considered: cryptography, host security analysis, security monitoring, computer-technical expertise, attack methods, response to information security incidents and notification of them.
The course prepares students for a professional certification exam and involves preparing network application administrators for the design of various network services.
The course presents the collection and analysis of materials for writing a graduation project.