Information Systems Security (Research and Teaching Direction)

Master of Technical Sciences

чек иконка Languages ​​of instruction: kazakh, russian

чек иконка Type: master

чек иконка Minimum Admission Score: 75

чек иконка Requirement for Graduation: не менее 120 кредитов

Безопасность информационных систем (научно-педагогическое)

Goals

The research and teaching Master's program in "Information Systems Security" is designed to train specialists in information protection, cybersecurity, and IT education. The curriculum covers cryptography, data protection methods, vulnerability analysis, cyber threats, and digital forensics, along with teaching methodologies for information security. Graduates acquire competencies for careers in research institutes, academic institutions, and government and corporate cybersecurity sectors.

RO-01. Apply the theory and methods of humanities, social, and educational sciences in various types of professional activities. Strive for self-development and adaptation to new economic, social, political, and cultural situations.

RO-02. Possess knowledge and skills in designing information and automated systems, implementing organizational measures to protect information in automated systems. Understand the role of a project in information security management and apply project management methods in the field of information security.

RO-03. Ensure information protection during the operation of information systems. Demonstrate the ability to implement project solutions for information protection in financial and information systems; apply existing regulations in the field of information security.

RO-04. Possess knowledge in developing organizational and regulatory documents for information protection in information systems and apply regulatory documents for counteracting technical intelligence. Be able to apply national, interstate, and international standards for information protection and regulatory documents for counteracting technical intelligence.

RO-05. Be able to analyze software, architectural, and schematic solutions of information system components to identify potential vulnerabilities in information protection systems. Demonstrate the ability to analyze methods of hardware implementation of cryptographic algorithms and design cryptographic information protection hardware and software using visual design programs, and perform trace analysis and verification of results.

RO-06. Possess methods for planning expert data analysis and monitoring and responding to information security incidents in critical infrastructure objects. Have skills in auditing information security of information systems, platforms, and operational procedures.

RO-07. Possess methods and technologies for developing secure client-server applications, database and knowledge base protection, and skills in using virtualization and cloud service distribution tools, ensuring the security of applications, communication channels, and data processing hardware and software.

RO-08. Assess the security level of computer systems and networks. Possess knowledge and a systemic understanding of modern technologies and hardware and software tools for personal data protection and information security in computer networks. Be able to apply methods and tools for high-performance processing of big data. Develop security policies for computer systems and networks.

RO-09. Possess skills in investigating cybercrimes, obtaining data from potential information sources, using disassembly methods, analyzing and detecting malicious software leading to information security incidents, and implementing protection technologies. Be proficient in techniques for finding and analyzing traces of cybercrimes, violations, and incidents.

RO-10. Possess methods for assessing ICT infrastructure risks to organizations, identifying threats, and determining a set of measures to ensure information security in information systems. Be able to conduct audits and analyze the results of compliance checks with regulations governing information security processes in organizations.

RO-11. Have skills in researching theoretical and methodological approaches to ensuring and managing the continuity of information system protection and managing incidents and information security in intelligent systems.

RO-12. Apply methods, content, and tools to ensure the required level of academic and professional competencies for students, conduct educational activities in higher education organizations based on psychological and pedagogical principles, and conduct scientific research.

Start Your Studies at Energo University