Level of higher education: first (bachelor’s)
Specialty: 257 “Information security management”
Specialized training
Profiled package of disciplines 01 “Artificial intelligence in security systems”
| Educational components |
Semester |
Credits |
Syllabuses |
| Ethical hacking |
4 |
3,0 |
PDF |
| Data mining |
4 |
3,0 |
PDF |
| Mathematical foundations of artificial intelligence |
5 |
3,0 |
PDF |
| Python for Artificial Intelligence and Machine Learning |
6 |
4,0 |
PDF |
| Genetic algorithms |
7 |
3,0 |
PDF |
| Python for Internet of Things |
8 |
3,0 |
PDF |
| Systems engineering |
8 |
3,0 |
PDF |
Profiled package of disciplines 02 “Blockchain technology and security of banking systems”
| Educational components |
Semester |
Credits |
Syllabuses |
| Decentralized systems |
4 |
3,0 |
PDF |
| Risk management |
4 |
3,0 |
PDF |
| Blockchain: basics and application examples |
5 |
3,0 |
PDF |
| Banking systems security |
6 |
4,0 |
PDF |
| Protection of critical infrastructure facilities |
7 |
3,0 |
PDF |
| Organization of document flow with limited access |
8 |
3,0 |
PDF |
| Social media safety |
8 |
3,0 |
PDF |
Profiled package of disciplines 03 “Innovation Campus”
| Educational components |
Semester |
Credits |
Syllabuses |
| Cybersecurity Basics |
4 |
3,0 |
PDF |
| Development of corporate information systems (part 1), (part 2) |
4, 5 |
3,0/3,0 |
PDF |
| Databases for corporate information systems |
6 |
4,0 |
PDF |
| Corporate information systems architecture |
7 |
3,0 |
PDF |
| Security and auditing of wireless and mobile networks |
8 |
3,0 |
PDF |
| Protection of critical infrastructure facilities |
8 |
3,0 |
PDF |
Disciplines of free choice of a student of specialized training
| Educational components |
Semester |
Credits |
Syllabuses |
| Legal regulation of information security |
3 |
4,0 |
PDF |
| Intellectual property of security systems |
3 |
4,0 |
PDF |
| Modeling critical infrastructure systems |
3 |
4,0 |
PDF |
| Methods and technologies of information warfare |
4 |
4,0 |
PDF |
| Protection of e-commerce and multi-service systems |
4 |
4,0 |
PDF |
| Databases with SQL and Python |
4 |
4,0 |
PDF |
| Security in DEVOPS |
5 |
4,0 |
PDF |
| Fundamentals of planning and administering information resource access services |
5 |
4,0 |
PDF |
| Risk theory in cybersecurity |
5 |
4,0 |
PDF |
| Cryptanalysis methods |
6 |
4,0 |
PDF |
| Internet. Navigation in complex systems |
6 |
4,0 |
PDF |
| Server application development (Java Spring Boot) |
6 |
4,0 |
PDF |
| Neural networks |
6 |
4,0 |
PDF |
| Cloud Security |
6 |
4,0 |
PDF |
| Design templates |
6 |
4,0 |
PDF |
| Administration of UNIX-like systems |
7 |
4,0 |
PDF |
| Organizational support for information protection |
7 |
4,0 |
PDF |
| IT project management and security |
7 |
4,0 |
PDF |
| Security and auditing of wireless and mobile networks |
7 |
4,0 |
PDF |
| Business intelligence |
7 |
4,0 |
PDF |
| Evolutionary programming |
7 |
4,0 |
PDF |
SYLLABUS CATALOGUE (PAST YEARS)