Cyber security-includes work on information security, independent and objective assessment of the current level of security of computer systems and networks, identification of existing security problems, design and development of information security systems for organizations and enterprises. The program will allow you to develop skills in software development, as well as in technologies for protecting information and Informatization objects, ensuring information integrity and analyzing system security
Profile subjects: informatics + mathematics
Admission Committee
(7172) 64-57-10
info@astanait.edu.kz
Mon-Fri 9:00 – 18:00
– Specialist on cybersecurity;
– Information security specialist;
– Information security engineer;
– Specialist in hardware and software protection of information;
– SAP specialist;
– Anti-fraud analysis;
-Reverse engineering specialist or code analyst;
– Developer of information security system;
– Specialist in forensic or cyber crime investigation;
– Pentester.
Training of highly qualified personnel with Applied mi knowledge mi integrity, confidentiality, availability of data, existing methods of design and support computer networks, security issues related to the operation of local and global networks.
OK1. The ability to understand the driving forces and patterns of the historical process, the place of a person in the historical process and the ability to understand philosophy as a methodology of human activity, readiness for self-knowledge, initiative, development of cultural wealth as a factor in harmonizing personal and interpersonal relationships
OK2. The ability to form and develop skills and competencies in the field of organization, planning and production management, the ability to apply the acquired knowledge to comprehend the surrounding environmental reality, the ability to summarize, analyze, predict when setting goals in the professional field and choose ways to achieve them using the scientific research methodology
OK3. Ability for written and oral communication in the state language and the language of interethnic communication, as well as in a foreign (English) language. The ability to use foreign sources of information, to have communication skills, to public speaking, argumentation, conducting discussions and polemics in a foreign language
OK4. The ability to be competent in the choice of ICT and mathematical modeling methods for solving specific engineering problems, the ability to be ready to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it
PC1. The ability to understand modern standards, regulatory framework, the basics of economic knowledge, scientific ideas about project management and technological entrepreneurship.
PC2. The ability to professionally use modern computer equipment, network components, computer programs and complex computing systems (in accordance with the objectives of the program), as well as use the safety rules, industrial sanitation, fire safety and labor protection standards.
PC3. The ability to possess the skills of using and applying algorithms, data structures and modern methods for creating (developing) and further supporting various software systems for analyzing big data.
PC4. The ability to use the basic principles and methods for solving managerial problems, the ability to execute project documentation in a software environment using computer graphics for various types of projects.
PC5. The ability to be competent in the choice of mathematical modeling methods for solving specific applied problems in big data analysis, including the willingness to identify the natural science essence of problems arising in the process of professional activity, and the ability to attract the appropriate mathematical apparatus to solve it.
PC6. The ability to design the architectures of components of information systems, including the human-machine interface of hardware and software systems, and to select operating systems and information protection methods.
PC7. Ability to develop information and information system software based on modern development methods and tools.
PC8. Ability to collect, process and analyze data using the organization’s methodological and technological infrastructure.
PC9. The ability to manage the life cycle stages of the methodological and technological infrastructure of software development, data analysis, design of IT infrastructure in various organizations.
PC10. The ability to use modern programming environments for the design and implementation of software solutions and databases for information and communication technologies.
PС11. The ability to apply the elements of probability theory and mathematical statistics that underlie the models and methods of data science, to choose the right methods of data analysis, machine learning and artificial intelligence to solve practical problems.
PС12. The ability to develop and implement safe and testable solutions based on new methods and technologies for information security, used when working with information and communication technologies.
LO1. Explain and understand the regulatory framework, including documents, standardization and certification procedures in the development of information and communication technologies.
LO2. Apply domestic and foreign standards for software development in organizations.
LO3. Apply practical programming skills and explain the general methodological foundations of program development, create system programs for various levels of computer systems and software architecture, including low-level programming and microcontroller programming.
LO4. Demonstrate knowledge of the architecture of computer systems, manage operating systems.
LO5. Implement basic network communication between devices, calculate and apply addressing schemes, configure and configure network devices required to ensure the functionality of information and communication technologies.
LO6. Apply project management tools at various stages of the project life cycle, make a qualitative and quantitative assessment of project risks, determine the effectiveness of the project.
LO7. Apply mathematical tools to analyze software systems and data based on statistical and probabilistic models.
LO8. Apply hardware and software services to ensure the continuity of the process of developing software systems.
LO9. Independently analyze modern sources, draw conclusions, argue them and make decisions based on information.
LO10. Develop secure server-side web client applications and mobile applications.
№ | Exam form | Recommended ratio, % |
---|---|---|
1 | Computer testing | 20 |
2 | Written | 10 |
3 | Oral | 5 |
4 | Project | 30 |
5 | Practical | 30 |
6 | Comprehensive | 5 |
The course examines the modern history of Kazakhstan as part of the history of mankind, the history of Eurasia and Central Asia. The modern history of Kazakhstan is a period in which a holistic study of historical events, phenomena, facts, processes is carried out, revealing historical patterns that took place on the territory of the Great Steppe in the twentieth century and up to the present day.
The object of study of the discipline is philosophy as a special form of spiritual studies in its cultural and historical development and modern sound. The main directions and problems of world and domestic philosophy are studied. Philosophy is a special form of cognition of the world, creating a system of cognition of the general principles and foundations of human life, about the essential characteristics of a person’s attitude to nature, society and spiritual life, in all its main direction.
The course includes an intensive English language program focused on grammar and conversational skills. The course includes topics reflecting the latest advances in information technology, and the terminology dictionary makes them directly relevant to the needs of students.
The course occupies a special place in the system of training bachelors with engineering education. For students of a technical university, studying professional Kazakh/Russian languages is not only improving the skills and abilities acquired at school, but also a means of mastering a future specialty.
In the course, information and communication technologies are considered as modern methods and means of communication of people in ordinary and professional activities with the help of information technologies for the search, collection, storage, processing and dissemination of information.
The course is dedicated to general political knowledge for specialties in the field of ICT. It includes political self-awareness, improvement of one’s political outlook and communicative competencies. The teaching of political knowledge is communicative, interactive, student-oriented, result-oriented and largely depends on the independent work of students.
The course includes knowledge of sociological subject areas, research methods and directions. During the course, the main sociological theories and the most effective ways to gain in-depth knowledge about various aspects of our modern society will be discussed in detail. The special importance of this course for students is to develop the sociological imagination, to understand the basic concepts of sociology as a science.
This course presents psychology issues in a broad educational and social context. The knowledge, skills and abilities acquired and formed as a result of mastering the course content give students the opportunity to apply them in practice, in various spheres of life: personal, family, professional, business, social, in working with people – representatives of different social groups and age categories.
The course is also designed to form bachelor’s ideas about the factors that complicate teaching at the present stage of development of society, about the difficulties specific to this activity.
The course will help to become the basis for the study of the entire complex of social sciences and humanities, as well as a supplement to general courses in history and philosophy. The course includes such topics as morphology, semiotics, anatomy of culture; culture of nomads of Kazakhstan, cultural heritage of Proto-Turks, medieval culture of Central Asia, formation of Kazakh culture, Kazakh culture in the context of globalization, cultural policy of Kazakhstan, etc.
The course is devoted to the formation of physical culture of the individual and the ability to direct the use of various means of physical culture to preserve and strengthen health.
Within the framework of the academic discipline, the student studies the essence of entrepreneurial activity on the basis of the current legislation of the Republic of Kazakhstan. The course will demonstrate the role and place of small enterprises in the modern conditions of the functioning of the economy of the state and society. The discipline will allow to understand the basic principles and content of the business plan of business entities, to form thinking based on modern anti-corruption culture, organizational forms of entrepreneurial activity are explained, including taking into account sustainable development, ecology and safety of personnel.
The discipline introduces students to modern concepts and tools of entrepreneurship and obtaining the theoretical knowledge and practical skills necessary to launch their own startup, taking into account the basics of life safety. On the basis of law and anti-corruption culture, the process of obtaining a patent, the legality of ownership of technological development is being studied, taking into account the legislation of the Republic of Kazakhstan in the field of intellectual property. Students apply strategic analysis in the field of economics, management, communication and technological entrepreneurship.
The course examines the OSI model, basic physical and data link layer protocols, types of equipment, design and configuration of local networks, subnets, etc. As a result of mastering, students will know and understand the principles of operation and design of computer networks, they will master the basic skills of working with the operating systems of network devices of the Linux family to configure them.
This course provides an in-depth, theoretical understanding of network security. The course explains network threats, mitigation techniques, and the basics of securing a network, securing administrative access on Cisco routers, secure administrative access with AAA. During the course, students learn how to implement firewall technologies to secure the network perimeter, configure IPS to mitigate attacks on the network, implement secure virtual private networks and an ASA firewall configuration using the CLI, perform test network security and create a technical security policy.
The course is devoted to the study of methods for analyzing the system for potential vulnerabilities and to create recommendations for eliminating vulnerabilities
The course aims to familiarize students with modern views and approaches to information security (IS) risk management, disclose the significance of risks for successfully ensuring the information security of an enterprise, explain the main stages of development and implementation of an information security risk management system, familiarize themselves with the main provisions of the leading world standard ISO 27005.
The academic discipline is aimed at developing the skills of using project management tools at various stages of the project life cycle. The subject of the discipline is the qualitative and quantitative assessment of project risks and the determination of its effectiveness.
The course is designed to study the basic methods and tools required for the introduction of scientific research. The course also introduces students to the most popular searchable databases of scientific articles, such as Web of Science, Scopus, ScienceDirect and others. During the course, students will become familiar with citation and search tools for the required scientific information. Summary of the main sections: empirical research methods (observation, comparison, measurement, experiment); methods of theoretical research (abstraction, analysis and synthesis, idealization, induction and deduction, mental modeling, ascent from the abstract to the concrete, etc.). Learning outcomes: Mastering the skills and competencies required to form a highly qualified specialist according to the purpose and content of the course.
In this course, students will learn in practice how to conduct a detailed analysis of network resources, software, web resources for vulnerabilities, their exploitation and further elimination. Also, students will get acquainted with the most common attack scenarios. At the end of the course, students will learn the main stages of penetration testing, the use of modern tools for analyzing the security of an information system or application, and the classification of vulnerabilities and methods for fixing them.
The course studies the basic principles, methods, and methods of Windows system administration. Students learn server configuration, configuring server roles and functions, configuring Hyper-V, deploying and configuring core network services, installing and administering Active Directory, and creating and managing group policies. They also explore modern file server and storage management technologies, Hyper-V virtualization, disaster recovery in Windows Server, SAN storage and failover cluster management, remote access implementation and performance monitoring in Windows Server.
Industrial practice gives students the opportunity to get acquainted with the real conditions in industrial enterprises or in business and form an idea of what the work in their chosen profession consists of.
Pre-diploma practice is intended for the collection, processing and systematization of the material necessary for the completion of the thesis / project.
The course covers topics related to the Bitcoin cryptocurrency. It lays out the fundamentals of Bitcoin technologies; how hash functions and digital subscriptions are intertwined; how reliable cryptography and encryption algorithms are; anatomy of transactions; verification and throughput; hard and soft forks. It explains how mining actually happens, how bitcoins are created, how to enter the Bitcoin network and how a digital wallet functions. In addition to basic mathematical education for students enrolled in the educational program «Cybersecurity», as a prerequisite, students are required to have a basic understanding of the basics: databases, computer networks, web servers.
The course focuses on the practical application of the MapReduce distributed computing model. For the implementation of the algorithms, a freely distributed set of Hadoop utilities has been selected, which is used to implement search and contextual mechanisms of many highly loaded websites during mass-parallel data processing. Currently, Hadoop is considered one of the fundamental technologies when working with Big Data and is used in many industries: healthcare, telecommunications, trade, logistics, financial companies, as well as in public administration.
The discipline is aimed at developing competencies that contribute to the understanding of the rhetorical and semantic aspect of a scientific text, differences in the structures and organization of scientific texts, writing their own scientific texts that meet the requirements adopted in the international scientific community. As a result of studying the discipline, PhD students will learn to use global databases such as Web of Science, Scopus, Elsevier, EBSCO and others. They will also master the use of programs Mendeley, EndNote and others.
The course covers classical algorithms (search, sorting, etc.) and data structures (queue, stack, tree, graph) used in programming. The principles of algorithm construction, tools for their description, concepts of complexity and performance, and the main classes of algorithms are considered.
The academic discipline includes knowledge of analyzing functions represented in a variety of ways, and understanding the relationships between these various representations; understanding the meaning of the derivative in terms of a rate of change and local linear approximation, and using derivatives to solve a variety of problems.
The academic discipline acquaints students with important branches of calculus and its applications in computer science. During the educational process, students should become familiar with and be able to apply mathematical methods and tools (ordinary differential equations, series, double and triple integrals) to solve various applied problems.
The course is aimed at developing an understanding of the IT architecture as a complex structure that unites all information technologies and resources used by a particular organization or company. The subject of the discipline is information technology infrastructure, the use of software, communication systems, information centers, networks and databases.
The course outlines the main approaches, methods and algorithms of modern cryptography, as well as formulates the basic concepts of modern cryptography. Much attention is paid to new areas of cryptography related to ensuring the confidentiality of interaction between computer users and computer networks.
This course introduces students to specialised programmes (a set of programmes) designed to organise and maintain databases. The course teaches students how to process information from databases.
Discrete mathematics is part of mathematics devoted to the study of discrete objects (here discrete means consisting of separate or unrelated elements). In a more general sense, discrete mathematics is used whenever objects are counted, when relationships between finite (or countable) sets are studied, and when processes involving a finite number of steps are analyzed. The main reason for the growing importance of discrete mathematics is that information is stored and processed by computers in a discrete way.
This course provides a broad overview of cybersecurity, including how computers and networks are attacked, how the attackers benefit, and how to mitigate attacks. The types of attacks, vulnerabilities, attackers, and malware are studied along with the introduction of underlying technologies used in cybersecurity. Social engineering, cryptography, and application security are also introduced. The security principles in the CIA triad (data confidentiality, data integrity, and data availability) will be studied during the course.
The course includes: Matrix theory, linear equation systems, vector theory, analytic geometry, limit and differentiation of functions of one variable
The course goal is to acquire the theoretical and practical knowledge in the field of artificial intelligence in general and in particular in the creating of algorithms capable of learning. The course examines the basic machine learning algorithms, various approaches and technologies for data analysis, their qualities, features and impact in various fields of science and technology. As an outcome of mastering the course, students will be able to apply machine learning methods to visualize their data, build graphs, and present the results qualitatively.
The course develops students’ knowledge of the basic mechanisms and devices of operational systems, the specifics of their interaction with the hardware of a computer, and introduces them to the principles of system programming at the level of Linux operating systems.
This course provides an in-depth examination of issues in operating system security. The course studies features and characteristics of the Linux and Windows Operating Systems with a focus on the design of authorization systems and thorough examination of the operation of network protocols and services. Students will study how to prevent malicious access to endpoint hosts and data and how to investigate endpoint vulnerabilities and attacks.
The course teaches the study of patterns of random phenomena and their properties, and use them for data analysis. As a result of studying this discipline, students will know the basic concepts of probability theory and mathematical statistics and their properties and be able to use probabilistic models for solving problems, work with random variables, calculate sample characteristics, evaluate the reliability of statistical data.
The course includes an intensive program of learning English related to professional activities. The course includes topics that reflect the latest advances in information technology, and a terminological dictionary makes them directly relevant to the needs of students.
The course teaches you to use the PHP programming language, master the fundamentals of the MySQL database and develop secure server-side client web applications.
The course is designed to study the basics of information security in practice.
The course is intended for a more advanced study of the Java or Python programming language, including the study of JSP (Java Server Pages), Servlet, JDBC (Java Database connection), including many basic principles of Java to Enterprise Edition (Advanced Java EE).Exception Handling, Generics, Delegates, Events, Lambda Expressions, Extensions Methods, LINQ, Nullable Types, Dynamics, Asynchronous Programming with Async / Await, and other topics.
In this course the possibilities of a legal attack on various web resources will be considered. As part of this course, students will learn how to find vulnerabilities and exploit them. Security bypass methods, the TCP/IP network protocol, Windows internals, and the Python programming language will also be covered.
This course examines the principles, methods and means of blockchain technology to ensure the protection of information, countering threats to information security. The principles of using a replicated distributed database of blocks to ensure information security and the use of the blockchain network in various fields are also considered.
In this course, students are introduced to processor modes, memory organization, service programming, file packing and unpacking techniques, disassembly and debugging tools and code analysis techniques. At the end of the course, students will understand how the compiled code works, master the skills of examining files for vulnerabilities, learn how to research malware and write down reports based on the results of the research.
The basic principles of programming a database system (PL / SQL) are given. The basic data models, database design, structured query language are considered. The architecture of the database system, the stages of database design, programming triggers, procedures, relationships, updating, restoration and management of the database management system are studied.
The course is in the format of training on information security for students.Studemts use a game approach, practical exercises, simulated attacks and other interactive techniques. This allows students to form sustainable habits and strengthen cybersecurity in the long term.
The course is designed for students to complete a project after the first year of study, a ready-made minimum product that they can present at various competitions (hackathons). The course does not imply the presence of a lecture, and all classes will be practice-oriented, with the maximum emphasis on obtaining the results of the finished product. During the course, students must apply all the knowledge gained in the first year, including knowledge of developing ready-made applications. A great emphasis on this course is given to the quality business component of the minimum product.
In this course, students are introduced to the basics of digital forensics. Students will learn the nature of digital footprints, which requires the use of new forensic tools, new standards of objectivity, verification, validation, and evaluation of evidence, as well as relevant experts. In this course, students will learn how to find webshells, find traces of an intruder, attack algorithms and write a report.
The course is designed to study programming, debugging and implementation of tasks. The principles of the operation of network technologies, access to local and remote network resources, programs using the C ++ language are analyzed.
The course is designed to explore the basics of programming, debugging, and software implementation. The course also analyzes how networking technologies and programs work using the Python programming language.
The course is designed to learn the basic concepts of object-oriented programming in Java.
The course is designed to study object-oriented programming inPython. Students will study the principles of object-oriented programming, additional elements of the Python language (classes, objects, templates, etc.), receive the concepts of object-oriented programming (polymorphism, encapsulation, inheritance, constructor, etc.), form understanding of the principle of code reuse in programming.
https://bizz77game.man1banjarmasin.sch.id/
https://bizz77game.id.fedora.co.id/
https://gudangtoto.smkn2-padangpanjang.sch.id/
https://bizz77game.majesta.co.id/
https://bizz77.tarunaakademia.id/
https://www.raars.zaragoza.unam.mx/wp-content/store/bizz77game/
https://sties-babussalam.ac.id/wp-content/themes/kakek-zeus/
http://earch.buet.ac.bd/v77game/
https://www.raars.zaragoza.unam.mx/wp-content/store/v77game/
https://bizz77game.smkn2-padangpanjang.sch.id/
https://sties-babussalam.ac.id/wp-content/themes/demo-games/
https://mannawasalwa.ac.id/wp-content/themes/scatter-hitam/
https://mannawasalwa.ac.id/wp-content/themes/sv388/