Level of higher education: first (bachelor’s)
Specialty: 257 “Information security management”
Specialized training
Profiled package of disciplines 01 “Artificial intelligence in security systems”
Educational components |
Semester |
Credits |
Syllabuses |
Ethical hacking |
4 |
3,0 |
PDF |
Data mining |
4 |
3,0 |
PDF |
Mathematical foundations of artificial intelligence |
5 |
3,0 |
PDF |
Python for Artificial Intelligence and Machine Learning |
6 |
4,0 |
PDF |
Genetic algorithms |
7 |
3,0 |
PDF |
Python for Internet of Things |
8 |
3,0 |
PDF |
Systems engineering |
8 |
3,0 |
PDF |
Profiled package of disciplines 02 “Blockchain technology and security of banking systems”
Educational components |
Semester |
Credits |
Syllabuses |
Decentralized systems |
4 |
3,0 |
PDF |
Risk management |
4 |
3,0 |
PDF |
Blockchain: basics and application examples |
5 |
3,0 |
PDF |
Banking systems security |
6 |
4,0 |
PDF |
Protection of critical infrastructure facilities |
7 |
3,0 |
PDF |
Organization of document flow with limited access |
8 |
3,0 |
PDF |
Social media safety |
8 |
3,0 |
PDF |
Profiled package of disciplines 03 “Innovation Campus”
Educational components |
Semester |
Credits |
Syllabuses |
Cybersecurity Basics |
4 |
3,0 |
PDF |
Development of corporate information systems (part 1), (part 2) |
4, 5 |
3,0/3,0 |
PDF |
Databases for corporate information systems |
6 |
4,0 |
PDF |
Corporate information systems architecture |
7 |
3,0 |
PDF |
Security and auditing of wireless and mobile networks |
8 |
3,0 |
PDF |
Protection of critical infrastructure facilities |
8 |
3,0 |
PDF |
Disciplines of free choice of a student of specialized training
Educational components |
Semester |
Credits |
Syllabuses |
Legal regulation of information security |
3 |
4,0 |
PDF |
Intellectual property of security systems |
3 |
4,0 |
PDF |
Modeling critical infrastructure systems |
3 |
4,0 |
PDF |
Methods and technologies of information warfare |
4 |
4,0 |
PDF |
Protection of e-commerce and multi-service systems |
4 |
4,0 |
PDF |
Databases with SQL and Python |
4 |
4,0 |
PDF |
Security in DEVOPS |
5 |
4,0 |
PDF |
Fundamentals of planning and administering information resource access services |
5 |
4,0 |
PDF |
Risk theory in cybersecurity |
5 |
4,0 |
PDF |
Cryptanalysis methods |
6 |
4,0 |
PDF |
Internet. Navigation in complex systems |
6 |
4,0 |
PDF |
Server application development (Java Spring Boot) |
6 |
4,0 |
PDF |
Neural networks |
6 |
4,0 |
PDF |
Cloud Security |
6 |
4,0 |
PDF |
Design templates |
6 |
4,0 |
PDF |
Administration of UNIX-like systems |
7 |
4,0 |
PDF |
Organizational support for information protection |
7 |
4,0 |
PDF |
IT project management and security |
7 |
4,0 |
PDF |
Security and auditing of wireless and mobile networks |
7 |
4,0 |
PDF |
Business intelligence |
7 |
4,0 |
PDF |
Evolutionary programming |
7 |
4,0 |
PDF |
SYLLABUS CATALOGUE (PAST YEARS)