• Ешқандай Нәтиже Табылған Жоқ

JI. H. I-YMHJIEB ATbIHAAFbI EYPA3I,I,g YJITTI,I( YHI,IBEPCIITETI EEKITIJIAI

N/A
N/A
Protected

Academic year: 2023

Share "JI. H. I-YMHJIEB ATbIHAAFbI EYPA3I,I,g YJITTI,I( YHI,IBEPCIITETI EEKITIJIAI"

Copied!
32
0
0

Толық мәтін

(1)

JI. H. I-YMHJIEB ATbIHAAFbI EYPA3I,I,g YJITTI,I( YHI,IBEPCIITETI EEKITIJIAI

(JI.

H. fyMuneB a

f

rrrsrl.ru Ker{ec

xarrava

J\b

Bac4apua

EIJIIM BEPY EAfAAPJIAMACbI OEPA3OBATEJII,HA,I TIPO| PAMMA

EDUCATIONAL PROGRAM

VAYnrrbrK yHtIBepcrrTeTi))

0l

E. B. CLusrxos

Kagp.napllur

gaiiuugay 6arsrruHulrl

arayr,r xoHe Ko1r,r:

Koa

u rraruenoBaHHe rranpaBr'reHrrq noAroroBrcu KaApoB:

Code and names of area of

training:

6B063-ArnaparrlrK Kayinci:,1ir<

6B063-HHdopvauroHuaq 6eronacxocrs 6R061-lnformation Securitv

2021

xsr,rrur rqaburgay/ Ilprrcll 202l

roaa/

Admission

2021 4 Nsur

4 roaa 4 yea:.

Ei,rirlirircAenrciii/YponcurxRa,ru{unaqur/Qualificationlcvel:6YEIII,6EBUI/6IIPK,6EPK/6NQF,6EQF

O EHy ?08-02-21 06paroeare,ruuar nporpaMMa. H3larrre Bropoe

Eargap,ra*ra

golre

iri,/Yponeus

nporparrlrrr/Program Level:

Eara,raepuar

/

Eaxa,raepuar/ Bachelor

6B06306-4rrnaparrsrr nayinci:air xvfi e,'reoi

(61118 (Eny 6a apna ncuHu( ara) u xrtrc xonH)

6806306-Cr-rcreuur undlopr'raunorrrrofi 6egonacuocrn

(Koa B flarMeHoBarrnc ofipaioBarcrb on porpaMMU) 6806306

-

Information SecuriW Svstcrns

(Codc and name of eduqrional protsraN)

O6r,ny71r,r11

rurrrir lreprimi:

Tnnnqrrurir

cpom o6yuenun:

Typical period

of study:

(2)

O3IPJIEIEH / PA3PAEOTAHA / DESIGNED

AraIeMr.rsrHK xonrurer/

Arageurve

Caru6arlusa

.II.

X

( Aru-x€Hi/OI,IO/Nante)

rer/

Academic Committee

f,!ru4/

tp.ot ,t-r

1z

Pagaxosa B. I

Il.

rAru-xori ofiO N., n()

(Aru-xoni/Ol,lO/Nrnrc)

(ndd;rl(o,"^is,"r,,,")

(mlnucJkon6rsis anrre)

Je oa A)

P*rz J2 rS 2,

OcuaHosa

A.

B.

(Aru-xoxi/OltO/NiNe) r,@ffieon6,r\*,t*e) Type6aeEa

P.lL

(Aru-x6Hi/OHOlNrn,e) ( roaoncL/(on!rsiSnahre)

Xyr'rurc 6epyui

/

Pa6orogare,rr/ Employer:

B:liu

anryunr

/ O6yqaroqrftcs/

Student:

Kamxsrs6afi B. E.

( A16r-x6H i/Ol,lOlN ame ) ( noanrc6/(onH/signature)

( Aru-xoH i/OHO/Name ) ( fl o,uorc[/(orrB/si gnalure)

/'k 4-

D? lJ

Eu,rs O. B.

AO

(fTC)

rAr xotsi'OHo N n,.)

Crurrron

,II.

M.

(Aara/KyHi/date )

Ceuros [I. X.

(ArLr xeHi/OHOlName)

t noanaca/rioruf i gnarure t

)l.oP 2,

(Atu-x6si/Ot{O/N.nte)

(APACTbIPbIJI.qbI / PACCMOTPEHO / CONSIDERED

AxaAeur,u:ru( xeqec orbrpLrcBrHAa./ Ha raceaasuu Axaaeunqecxoro ooBera /

At

the meeting of the Academic Council

Kyni

/

4ara/

dals

ld. O/

20

X-/

xanavra

/

nporor<o.n / Record J,.lb

,Z

EEB capanraruanay

ce(qltscbrHlr{

'reparacEr

/

flpegce4areas cexrlrru

3xcnepruru Ofl

/Chairman

ofthe

Expertise Section

of

Educational Programs

tt ol tt

4u 2l oa

(Aarrkylri/datc )

_ ,{N2./

YCbIHbIJIAbI

/

PEKOMEHIOBAHO

/

RECOMMENDEI)

AraAeunrluK

reqec orslpbrclrHAa/ Ha saceAanulr Axa4errauvecroro coaera./

At

the meeting of the Academic Council

Kyui/gara/date !. ( .o)

20 J-.1

xarrava

/npo'roxo:r

/

Record

Ns 2

Orqy ici

xoniu4eri

npopexrop

/

no YP

/

Vice Rector

for

Academic

Affairs

Onrap6aen E.

A J[', 02 pl

(,qara/qri/date)

Carnaesa C. K.

(

KEJIICIJIII / COIJIACOBAHO / AGREED

Oar<ylsrer gexausr /

flerau Saxylrrera /

Dean of Faculty

<D EHy 708-02-21 O6pa:oaarerrxar nporpaMMa. Ll:aauue aropoe

(3)

I

MA3MYHbI/ COAEPXAHI,IEI CONTENT

Eirir'r 6epy 6ar.qaprauacnnuq nacrop'rs/ flacnopr

o6pasonare,rruofi nporpauur/

Passport

of Education Program

2. I(ysnperri;rix/6eftiH rapracu/ Kapra/npoQum roMnsrenqu /

Map/ Profile of

Competences

3. Eiair',r 6epy 6ar.[ap:rauacusuH uasrryuu/ Co.{epxaHue o6pa:oaarorruofi nporpauuu/ The content of the education program

4.

Ei.rrirr.r

6epy 6ar.qap:rauacuHuq lro.4ylr4epi 6e,riniciHae

urepirrex rcpe.qurrepAiH xoreuiu xepcere'riu

xubrHrbrK

recreci/ CsoAlra, ra6rlrqa, orporarouau o66ela ocsoeuHux

Kpe.(rnoB B pa3pe3e

noAyrefi o6pasonarearuoft nporpauun/

Consolidation table displaying the amount of obtained credits within

the

modular

education

program

4

9

t4

28

5. Biriu 6epy yaepiciH yfinugacrupy/

29

o6paronareruroro npoqecca,/ Organization

Process

Oprauu:auux

of Educational

3

O EI{y 708-02-21 O6pasoaare,rruar nporpaMMa. I.I:aaaue aropoe

(4)

Bi.riu

6epy 6argap,ranacuHbrH rraclroprbr/

[Iacnopr

06pa30Bare,'rbHoil rIporpaMMr,r/

The

Passport

of Education Program

(o.ngary caracu

O6.nacrr rrpuMertenrifl

Application

area

Eirirtr 6epy 6araap.irauacu a(raparrbl( xayinci:aix

caJIacLIHAarbI 6ara.nanprap,ur aaft srHAayra apxa.rrax

O6pa:onarearxaJr nporpaMMa [pe.qHa3HaqeHa

.qu

ro.qroroBKrr 6ara,ranpoe

r

o6:racru r.rx([oprrraquoulroft 6esouacHocru

The educational program is designed

to

prepare bachelors

in

cybersecurity area

Ei,rilr

6epy 6arqap.narracrrHsrrl

KOAI,I MEH ATAYI,I

Koa u

HanMenoBaurre o6pa:ooare;ruuoft

IIporpaMMbr

The code and name of

education

program

Hoprrarnrrin-

KYKbIKTLI K

I(alltrlr!'IybI

Hopvrarunuo-npaBoBoe o6ecneqenlre

The regulatory and

legal

support

-2007 xsurgsrq 27 wtueteri

Ne

319-lll Ka:arcrau

Pecny6rnxacuHurl

<Eiair'r rypamr>r 3aHsr. 2020

xrrrabrH

7

uriueaeri

Ne

361-VI

earepicrep MeH TonbrKrbrpynapMeH

- 31.10.2018 x.

Ns604

Xorapr,r 6iriru 6epyaiq neu.nexerrir

xarrrrbrra urisAerri craHAaprEr

-

30.10.2018

x. N595 Xorapru xeHe

(HeMece)

xoraprr o(y

opHbrHaH

reiinri 6iniu 6epyaiu 6iliu 6epy

6argap:rauarapuH

icKe

acLlparsrH

6iriu

6epy yftsnrrgapu

(ugMeriHiq ylrinix 4arugalapu,

18.05.2020

x.

J\b207 esrepicrep MeH roJrbr(TbrpynapMeu

-

12.10.2018 N. Ns563

O4uryaun

xpear.rrri( rexHo,lorHrcbr

6ofisrtua

o4y npoqeciu yfi

uuaacrupy

Karu.qa"'rapbr

- Xorapri xaHe xorapbr o(y

opHLrHaH

xefiinri 6iriui 6ap

xaapnapau Laupray

6arrnrapnHrq

crrHbrnrayb[rrLr

-

05.06.2020

x.

Ns234 xaHe 13.10.2018

x.

Ns569 KP

ExFM 6$psrrsrna

6ocsruura

-

"A4naparrurx un$paqprusrrr.r xaHe

AT rqayinci:1iriu 4auralracu: ery"

xoci6u

cranaaprr,r

- <Aralrexeur

I(a:aKcraH

Pecny6ruxacu Yrrrrt(

Kacinxepnep flaJraracr,rHbrq Bac4apua Teparacrr opun6acapsrxuq 20 I 9

Nr,urrt 24

xellro(caHAarbr No 259 6yfipsrrsrHa 34-4ocuuura

(1

uycr<a, 2019

x.,6oaxaaAn (aira

Kapay

xyui:

30.12.2022

x.)

- fI EYy 708-18 JI.H. fyrrruaen arbrHAarrr Eypasut

prrrrbrK

ynrlnepcureriuiu Ei,riu

6epy 6ar.aap.nalraaapuH asiprey,

capa[ray

xaHe 6er<iry 6ofi rrnura pecirrli

<I{uQpnurq Kasa(craH> lrer,.uexerrir 6argaplauacu I(P Yrirrreriuiq

12.12.2017

x. N827 I(aymrcrrueu 6erciriaai (P YxiMerinin

12.12.2017

xlulrhl No827

(ayJrr,rcbrMeH

6eriri:rreu <l]uQp::rN

I(asaKcraH>

rrel.rlexerrix 6araaprauacu.(aga(crau Pecny6lr.rracrr YnrrtK

xecinxep:rep [aJraracH < AKnapa'r'rrr4

xayinci:ziro Eac4apuacrmru

xoci6u craHAaprbr <A'rauexes> <EI( Cay:reruinep >, (05.12.2018

x.,

No 330);

<A4naparmr4

aH(f parqyprurrnrr

ves AT xayincitairin

(aMraMacbr3

ery),

(05.12.2018

x., No

330);

<XacanAu lrHreJr.reKr (ocr,rMrxanapbrH ssip:rey>, (05.12.2018

x.,

No 330);

<Eugxec -aHanr.rrr.rKrep xaHe

IT

-xo6a,'rapabr 6acxapy> (05.12.2018 N., No 330

O EHy 708-02-21 O6pa:osarenrxar nporpauua. I4:aaxue nropoe

6B06306-AxnaparruK r1ayinciaaix

xyrienepi

6B06306-Cucreuu

unQopuaquonnofi 6egonacHocru 6806306-Information Security Systems

4

(5)

- 3arou Pecny6;ruru Ka:axcran <06

o6pa:oeauvtu>

or

27.07.2007 r.

Ns3

l9-lII

c r.r3MeHeHr.rrMu r.r aofloJrHeHrrrMu

or

7

uxns

2020 r Ng 361-VI

- locyaapcroeHsufi o6uleo6s:arearuuft

craH4apr Bsrc[rero o6pa3oBaHu

or31.10.2018r.Ns604

- Tunosue [paBr.rJra AerreJrluocrr,r opraHrr3arlr4fi

o6pa3oBaHur,

peanr-r3yrcqax o6pa:oaaremnrre lporpaMMbr Bbrcuero u

(lu'r.u)

locneBy3oBcroro o6pa3oBaHr,r,

or

30.10.2018 r.

N595

c H3MeHeHr{rMu r,r

AoronHegr.rflMr.r

or

1 8

^aas

2020 r. Ns 207

- flpanara

opranu3arluu

yqe6uoro

npoqecca

no

xpe4u'ruofi TexHoJrorurr o6yueuur.

or

12.10.2018 r. J\b563

- Kraccurfnxarop uanpasleuui noAroroBKu

Ka,qpoB

c

Bblcrtrr,tM n locJreBy3oBcKrrM o6pa3oBaHr.reM

- flpxroNeuue

K rrpI,rxa3y

MOH

PK

or

05.06.2020 r.

N234

u

or

13.10.2018 r. Ns569

-

flporf

eccuouamnuft craHAapr <O6ecue.{eHue

6egonaorocru

uxtfoplraqrouaofi

rrHQpacrpyKTypbr

r{

I,IT>

-

flpr.r:roNenue

Ns34

x npuKa3y 3aMecrurgrq flpe,qceAa'renr flpao:reHur Haquonaaruoft

nararrr npe4npunuvarerefi Pecny6lurlr KasaxcraH <Arauerceu> or

24.12.2019

r. Ns 259 (aepcur l, 2019 rot, aara

opneHrrrpoBoqHoro

repecMorpa:

30.12.2022

r.)flpoqegypa no

paspa6orxe, 3Kcneprr.r3e u yrBepx.qeHaro o6pa3oBarenbHlrx aporpaMM

n EHV

alr. JL H. fyrlru:reaa

n EHv

708-18

locy4apc:rrenuar nporpaulra <l-{u1|pooofi Kaeaxcrau), yrBepxAeHa rocraHoBrrer

{eM flparu:renrcrna PK Ns827 or

12.12.2017 r.

flpoQeccr,ronalrHufi

craHAapr <I4xrf opuaqnonnas 6e3onacuocrb)

flpanneuue HaquoHamuoft rraJrar6r upe4npuuuuarelefi

PK

<Arauexeu> <Apxarerropu flporpaMMuoro

o6ecneueuul>, (05.12.2018 r. Nr330);

<O6ecneqenue 6egonaorocru uuQopuaquounoft

unrppacrpyrrypu

u I4T>, (05.12.20 I 8 r. Ns330);

<Pa-epa6orxa npraoxenuit HcKyccrBerrsoto

r.rHTeJrJreKTa),

(0s.12.2018 r. ]ll!330);

<EusHec aHirrHTLrK.r

a

yflpaBneHr{e npoeKTaMa I,IT>>, (05.12.2018 r.

Ns330);

-

The

Law of

the Republic

of

Kazakhstan "On Education"

of

Jt:'ly

27,2007

No.

319-lll with

amendments and additions of July 7,2020 No. 361-VI

-

State compulsory standard of higher education

of

3 1.10.2018, No. 604

- Standard rules for the activities of educational

organizations

implementing

educational

programs of higher and (or)

postgraduate education

ofOctober

30, 2018 No. 595

with

amendments and additions

of May

18, 2020 No. 207

- Rules for organizing the

educational process

on credit technology of

education

of

10. 12.201 8, No. 563

- Classifier of

areas

for training

personnel

with higher

and postgraduate education

- Appendix to the order of the Ministry of Education

and Science

of the

Republic

of

Kazakhstan

of

05.06.2020

No. 234

and

of

13.10.2018 No. 569

-

Professional standard "Ensuring the security

of

information infrastructure and

IT" - A

endix

No.

34

to

the order

of the

De u Chairman

of

the

5

O EHy 708-02-21 O6pa:oaaremxar nporpauraa. I,lr.uaune aropoe

(6)

"Atameken" Board of the National Chamber of

Entrepreneursof the Republic

of

Kazakhstan

of

24.12.2019, No. 259 (version

1,2019,

date

of

tentative revision: 30.12.2022)

-The

procedure

P ENU 708-18 for the

development, examination and approval of educational programs at L.

N. Gumilyov

ENU

- The state program <Digital

Kazakhstan>

approved by

decree

of

the

Govemment of RK Ns827 of 12.122017 State program "Digital

Kazakhstan", approved

by the Resolution of the

Government

of

the

Republic

of

Kazakhstan

No.

827 dated 12.12.2017. Professional standard

"Information

Security" Board

of

the National Chamber

of

Entrepreneurs

of the Republic of Kazakhstan "Atameken" "Software

Architects", (05.12.2018, No. 330);

Ei,riu

6epy 6argapa,rarracr.r aflcbrHAa aafir,ruaay

6eftisinin xapracr,r/ Kapra

npoQu,rq ro.uroroBKrl B paMKax o6palonare,'rsnofi

nporpaurvrtl/ Profile Map

of

Education Program

EE rraKcarrr Ile,rr OII

Objective

of EP

Keci6u KH:rtrerreri xypae:ri uacere:repAi rueruy xesilrAe aKnaparrbr Kopray

eaicrepiu

KonaaHa aJrarr,rH,

Taunayrbr

apryMeHTTe[,

ra.flaay xyprige

6i.:reriu

iu6epxayincis4ir

ca:racbrHAa 6acexere rca6i::erri 6ar<a:ranprapau 4aftnu4ay

f]o,qrorosxa xoHxypeurocnoco6urx 6axaaaopoa a o6racrs ru6ep6eoonaorocru, cnoco6nux

anarr,r3l,rpoBarb, apryMeHTupoBarb

au6op, npuueu-rrl

Meroabr 3arrIHTLr raHtfopuarlulr

flpfi

peureHr,ru cJroxHr,x sagau a nporf eccuonarurofi .(esreJrbHocrr,r

Preparation

of

competitive bachelors

in

the

field of

cybersecurity, able to make decisions, analysis,

justification,

application

of information

security methods

in

solving complex specialized problems and practical problems in professional activities

Ei,rinr

6epy

6argap,ralracrrnrrq

TYxbrpbrMAaMaCbr

Konuenquq o6paronare.rrnoii uporpa

rnrbr

The

concept

of

education

program

Biriu 6epy

6argap.nauacrr

6iriu 6epy y.uepiciu xy3ere

acbrpyabrl

Ma(catrapbu, neruNerepiH, MzBMyHsrH. rrraprrapu

MeH

TexHoJrorurJraprrH,

ocbr 6arurraru ry,rerrepai Laspnay

ca[acLrH

6ara.nayau perrefiai NaHe 6inilr

a:ryrxbrJrapAbrn

Aafir,rsAsr(

canacr,rH

(aMraMacbr3 ereriu Marepfianrap.4br xaHe rr.ricri 6i,riu

6epy

TexHonorflcnapbru

euri:yai

(aMrrlaLr. EE

epexrueriri

rpunrorparf

ur

xsHe KpullroraJr.qay caJracbrH.[a tfopr'ran4sr annaparrbr

nrepy; iruxi

xyfie:repre, (ypburrbrJrapra, aKnaparr!,r(-KoMMyHuxarlurnbrK

xyfi enepaix

KaHaJuapbl MeH glreMeuTlepine

ru.rn4rr

[porpaMManr,(-rexHpr(irJrbr( acepiue 4apcsr

rypy, AX a(raparrbr ropray xyftenepin (ayincis

6acrqapy;

uu<fp:rrx

(brJrMhrcrapabr 3eprrey

xue

aJrabrH arny r<a6i:rerin Kanrrnracrr,rpy.

O6paronaremuar [porpaMMa

pernaMeHTr.rpyer

ueJrr.r,

pe3ynbrarr,r,

coAepxauue, ycnoBr.r, H TexuoJroru[

peurusag:z.ll o6pasonarenrxoro

flpouecca, oueHKy

KaqecTBa

uoAforoBxl{ Bbr[ycKHH(a no

aaHHoMy HanpaBneHr.rrc r.r BxJrroqaer

r

ce6r

uarepualrr,

o6ecueuanarourr4e (aqecrBo

loAroroBKu o6y.rarouluxce rr peanu3arluro

cooraercrnyrcrqefi

o6pasonarelrHofi rexso:roruu. Oco6ennocrrro Ofl ssrqercq

BJrareHr.re

6

O EHy 708-02-21 O6pa:oaarerrnar nporpaMMa. H:1auue aropoe

-

"Ensuring the security

of

information infrastructure and

IT",

(05.12.2018,

No.330);

-

"Development

of artificial intelligence applications", (05.I2.2018,

No.

330);

-

"Business analysts and IT project management" (05.12.2018, No. 330);

(7)

$oprrrarrurna

anaaparoM

s o6racru rpuurorpaQuu It

Kpl,IlroaHanrca;

cnoco6nocrr nporuro,qeficrnu, BpeaoHocnoMy

nporpaMMHo- Texur,rqecKoMy sos.qeficrnuro Ha rloAclrcreMbl,

ycrpoicrna,

3neMeHThI I,I

KauaJrrr uuQoxor*ruynuxaql{oHnr,x cucreM,

6esonacuoe

aaMnHncrpr.rpoBanue

crcreM

3ar{r.rrLr uu([opr*raquu I,IC; npe4ynpex4euue u paccneAoBaHrie

qu$ponrx npecryuexuft

.

The educational program regulates the objectives, results,

content,

conditions and

technologies

for the implementation of the

educational process, assessment

of the quality of

graduates

training in this

area

of

training and includes materials that ensure the quality

oftraining of

students and implementation

of

appropriate educational technology. The specialty

of

the EP

is

the possession

of

a

formal

apparatus

in

the

field of

cryptography and cryptanalysis; the

ability

to counteract malicious software and technical

impact on subsystems, devices, elements and channels of

infocommunication systems, secure administration

of information

security systems; prevention and investigation of digital crimes.

Ty,rexrirl 6i"rirri.nix cunarrauact r/Kna.nurluraquonHac

xapaKTepucruxa

nunycxxnxa/

Graduate

Qualifi cation

Characteristics Bepi,rerilr

qepexe:

Ilpucyxqaenrar

cretrerrE:

Awarded

degree:

<6B06306-Axnaparrrr( xayincisAir

xyfierepi>>

6iniu

6epy 6ar4apaauacu 6ofi rrnrua a4naparrbr(-KoMMyguKauusr6r( TexgoJromqJrap 6axa.nanprr.

Baxaraap s

o6racru

uu$opruaquouuo-roMMyHr,rrarluouurx

rexnolorufi

no

o6paronarearHofi nporpauue <6806306-Cxcreuu uurloplraquosnofi 6*ouaorocru>

Bachelor

of

information and communication technology

in

the educational program <6806306-lnformation Security Systems>

MarrannuH

"rraya3brMAapErHun

ririmi llepevenr go.nxnocrefi

cneqllaJrrIcTa

List of

specialist's positions

-A(naparrury-xoMMyHr.rKarlflr.nlr( xyfie:repiuge a(fiapmrBr

Kopray

6ofirnlna

rraaruan;

- IluQpirrK rexnororrrlap

6ofirrrrtra Kpr.tMr,rEruucrnxa MaMaHLr;

- Kolrnrrcreprix xerirep

rrren

xyfie:rep xayinciaairiu recriaeyuri

xaue TanqaymLr;

-

ArqnaparrbrK r(ayinci:air ca-nacErr{aarbr rrHxeHep-nporpaMMr.rcr;

- AI(

ayaaropsr;

- .{eperrep 6a:acsr, xorr,rnrrorepnix xeninep MeH

uuQparyplr.nrnr

a,&.{r,rHHcTparopbr.

-Cneuuaaucr iro 3arrure

nuQopr"laqrau

n

urr[orout'lyulrralu,rouH6D(

CI,ICTCMAX;

-

Cneqr.raaucr-xpuMrruaJracr uo qatfponrnr rexxoJron{flM;

-

Ana:rurux u

recrrpoerqux

6e3onacHocrr.r roMnbprepHrD( cerefi u clrcreu;

-

I4nxeuep-uporpamr.racr n o6racru

uurfopuaqrounofi

6eronacuocru;

-

Ayaurop

[IE;

-

A.qrunucrparop 6ar

gaunrx,

roMuBrorepubD(

cerei

n

uxrlpacrpyrrypsr

-

Information security specialist in infocommunication systems;

- Digital

Forensic Specialist;

-

Analyst and tester ofcomputer networks and systems security;

-

Engineer-programmer in the field of information security;

-

IS Auditor;

-

Administrator of databases, computer networks and infrastructue.

Keci6n

Krr:uer

caJracbr

O6.nacrr

uporleccxoua.nrnofi

Kounrrorepaix, TeneKoMMyrr{KaqusJrbrr( xenileparu, 6yrrru rexHoJrorfirnaparrq, ecerrrey xyfie.nepiniq, aepeKrep 6a:acrnrrq, recinopuu ux$parqprurln'lrnrrnt Kayinci:airi; rpunrorparfur;

atqrraparrm(

7

O EHy 708-02-21 O6pa:oaare.nrxae nporpauua. I,I:.{auue rropoe

(8)

AeqTe"rrbIlocTu

The area of

professional

activity

xayinci:gix

xyfieaepi.

Begonacnocrs KoM[brorepHhx, TeneKoMMyHLIKarI]toHHEx

cerefi,

o6:rarnolx

rexHolorufi,

Bbrr{I{cJIr.rreJrbHED(

cucreu, 6as

.qaHHbD(,

unQpacrpyrrypu

npe.ryrp[rrnfi ; xpurnorparf ux; cuc'reurr

un$opuaquonsofi

6esonacuocru.

Security

of

computer and telecommunication networks, cloud technologies,

computing systems,

databases,

enterprise infrastructure;

cryptography;

information security systems.

Kaci6n

Kbr3nter o6r,ercrici

O6rerr

npoQeccuoHa.rsnoii AecTe,rbHocTIl

The object of

professional

activity

Axnaparrrq

aKrr,rrrep,

AI

anQparcgpuurrnarr, xacinopuurHrrq aKnaparrr,(

xyfieaepi;

ar<naparrru< r<ayinciaairri KaMTEMacr,r3 ereriH xyfi erep.

Llnrfoplraquouurre aKrr,rBrr,

IT-zu<f

pacrpyxrypa, uutfoplraquouune cr4creMLr npegnpr.rrrufi; clrcreMbr o6ecne.reHus

au{opruauuouuofi 6e:onacnocru.

Information

assets.

IT

infrastructure Information Security Systems.

Enterprise Information

Systems;

Kaci6n

Kr,r3*rer

rlyuxqun,rapr.r

xeHe

ryp.repi

<Dyurqun H

BrA6r

npo$eccuouarr,uofi

AeqTe,'IbHocTu

Functions and types of

professional

activity

-

Famatuu-rcpmmey )raHe mexHotozt uLttbt

ti

Kecinopungap uea yfima4apabrll aKnaparrb(

r<ayincis4ix xyfieaepiH TaJr4ay xaHe MoAepHrr3alur_flnay;

I]uQprrx rqpbrrrrurap MeH xa6ArnqapAuq

Kpr.rMuHan[crr.rKanrrK caparrrlMacBI;

A$raparrr( TexHonomffrap canacbrr{Aarbr 6pylsurncrap

MeH

(BrJrMLrCTapALr 3epTTey;

-

I(oadany craue asiptey

Axnaparrrq

xyftenepaiu

rayinci: xqrrrcrm $rruaacrurpy

xeHe onapa,lrsr

a(naparrbx

r<ayincisaiKri 6acrqapy.

Kounuoreplix xyrierep ueu xe

.repAe

al(napaTlbl (oprayablr{ flporpaMMaJrbr(-an[apa[6r(,

TexHr,rKaJr6r(,

xpunrorpa$ru,rbr(

q?a,rrap6rg eurisy xeue nafigaaany;

Kaciuopunaapar,ra aKnaparrbr( xyrlerepinaeri xaHe AT

uaQpargpuurrru.4apllHAarbr

a(napa'rrbr{ xayincirairriH iruxi

xyftenepin xo6a;ray, eripley,

euri:y

xeue (oJraay;

- Y

atudacmutpywbutbul JEaHe 6ac 4apytuatnuul

Kecinoprnraapaa aKnaparrLr (opFay&rH

lfibuAacr6rpylrEr.,lrr(

ruapanapbrH asipaey xane

eruipy;

Aruaparrru<

(ayincbAi(

carJracbrHAarhr

$rugacrrrpyrururrry,

xoprumurrix,

T;?a$arrAlrpymlr rp(arriMaHbr

a:iprey,

euriry

xane xoypri:y.

-

Hryu uo - uc c t e d o a ame nu c xan u me xH o

l

ozuve c Kat

Asa';uz s.

MogepHu3aqr,{s

cucreu uu<fopMaqfiouHofi

6esonacHocru npegnpuxruft

u

oprauuta\ui,r;

Kpuuuuaaucrr.rvecxaa sxcneprr,r3a qutlporux ycrpoficrn

Lr

o6opy4orauua;

PaccreAonanqe HapyrtreHuft n npecryn:reuufi s o6racru

unrf

opuaquounux rexxoloruft

;

-

3xcntyamaquou u aa u pazpa6 om\e c Kca

Opranu:aqnx

6esonacHoft gKcnnyararluu

llurfoplraulronnLrx

cHcreM r,r

y[paBneHr.re

3aqlrroft uu$opuaquu n uux.

Bneapenue r.r 3KcrrJryaraurrs flporpzuMHo-anflaparHBx, TexHrrqecKr{x, xpunrorpaQu,recK}tx cpeacrB sarrunmr untlopruaqlllr B KoMrrbrorepHbx crrcreMax

r certx;

flpoerruponaxue,

paepa6orra, Brreapeur.re

rr

conpoBoxreurre fioacrrcreM

3aqrrT6r ran$opuaquu n

uu<f

oprraaquounrx cucreMax ra IT-

untf

opacrpyrrypax

upeanpusrufi ;

8

O EHy 708-02-21 O6pa:oaarenr,xax nporpaMMa. H:.uauue sropoe

(9)

-

Opeauuz a4uo u H o -y np as Jrc H q e c Kan

Paepa6orxa H

BHeapeHr.re opraHu3auuoHHbrx uuurf oprrrauun Ha rtpeArrpxsrurx;

Pa:pa6orxa, BHeapenr.re u

conpoBox(aeHr,re

nopuarunnofi, pery:rupyoruei

Aor(yMeHTarlufi uur[opuaqnonHofi 6egonacuocru.

-

Scientific research and technological

Analysis

and modemization

of information

security systems

of

enterprises and organizations;

Forensic examination of digital devices and equipment;

Investigation

ofviolations

and crimes in the field of information technology;

-

Operational and development

Organization

of safe

operation

of information

systems

and

information security management

in

them. Implementation and operation

of

software, hardware, technical, and cryptographic means

for

information protection in computer systems and networks;

Design, development, implementation and

maintenance

of

information security subsystems

in

information systems and IT-information structures

of

enterpri ses;

-

Organizationol and managerial

Development and implementation of organizational

measures

for

the

protection of information at enterprises;

Development, implementation and maintenance

of

organizational, regulatory documentation in the field of information

Mep IIo

3aruuTe

and

opraHrr3aur.roHHo-

s

o6,'racrlr

9

O EHy 708-02-21 O6palouareruxar nporpauua. H:ranue aropoe

(10)

2

erri.nirc/6eiiin xa

acr,r/Ka II

u.rr xounerenulrfi/ Ma / Profile

of Com tences

O(rrry

narrxqnepi (YI( ue,rurepi)/

Peryruraru o6y.reHua (egltrriu6r VK)/

The result of training (UC units)

Oqurry Haraxecix KaJr H nracrsr parbr lr

(ryruperririr

ue,rurepi) naHgep arayur/

HanMeuosaHrle rrlcunn"run, Qopulrpyrcurlx pe3yJrhrarbl o6yeeHlls (eAlIHrIuu romnereuuril)/

The name of courses that form results of training (uItits of competences)

OHr

- Xexe,

Ma.aeHr ryprbraaH

xete reci6n

KapbrM-KarbrHac 6arulrrapuaaarsr uece.nerepri ueuyae ayr,Bua xese xal6aua rypre Ka3a&

opbrc xane uere,,r rhaepiHae 6a .nanuc xacay

POr

-

Bcrynaru B r(oMMyHxxauaro a

ycraoi ,r

rttlcLMeaHofi $opnax xa KanaxcxoM, pyccxoM

tt

[HocTpaHHoM ,3trKax

&n, peueHut

3aaaq

Meron qHocrHoro, MexKynLrypHoro u npoSeccuoxarrxoro o6uesrs

RTr

-

To get into communication in oral and written forms in Kazakh, Russian and foreign languages in order to solve problems of interpersonal, intercultural, and professional interactions

OHr

-

Arnapamapau iraey, caKray! orurey, (opmy xoHe raparyaa uuQpnsrx

TexHoJrorrrlbr, eprypri a(naparrhr( xeHe

KoMMyHrrauuf,JrhlK

rexHoJrorrrlrapaLr (onaaHy

xeHe ripuri.nirriu aprypli

ca.ra.napuuga recinxeprix 6iriuai rtoraana 6i,ry

POz

-

Hc[o,'rL3oBar6 unQpoBylo

rexHororrrc,

pa3rrrqubre B]r.qbr

xuQopuawrotttto-xoMMyHlrxaufiolrHhlx rexHoror[tr no norlcKy, xpaHeHxro,

o6pa6orxe,

3aqare n

pacnpocrpaHeHlrro ux$opuauan

t,t

flprrMeHrrh rrpea[pnHr{MarenbcKHe 3HaBH, B pa3Jlr.rnux c$epax xr:re,(errenlHocrl RT:

- To

use digital technologies, various types

of

information and communication technologies for search, storage, processing, protection, and dissemination

of

information, as well as to apply economic knowledge in various spheres of activity

OI(r

-

3amaxayr

KOMMyHllXaqXrnbrl( rq?anlap

MeH TeX HOjIO rurrlap,[bt (OJIAaHa 6iny

YKr

-

Cnoco6Hocrr

ucrrorb3oaaTL coBpeMeHHHe KOMMyHXXaUTOHHbIe CpeACTBa X TEXHOJIO TT }I

UCr

-

Ability to use modem

communication tools and technologies

0(z -

Bipryrac rruruur

xyielix

xorrapacna ueriraenrcH ap rypni xar,(aiirapabr 6ararray xa6i.neri

YK2

Cloco6Hocrb oueHuBarb

pa3JrHrr Hr,re cHryauru Ha ocHoBe

UEJIOCTHOI-O CllCTEMHOIO Hayt{Hor-o M r-rpoBo33peHu, UCr

-

Ability to assess various

situations based on a holistic systemic scientifi c worldview

Otlr

-

QneM.qix Ke3(apacrbr Karbrmacrhrpyaa QurocoQru,rrrx 6iniuai rongana 6i,ry, couuueu 6ipre a3aMarr6rK ycraHLrM (anbrrrracrr,rpyna raprlxu rauyauq uerirri x*erlaepi uea :a4lu.rrrrrapuu raraai 6i,'ry

PO:

- flpnuenrrr

$rurocorlcxr,re

3r.raHm An,

tlopuupoeanu.r Mr-rpoBo33peHgecr(ofi Ro3llul.u, aHirnfl3rrpoBarb ocHoBHbre

3Ta[br

tl

3aroHoMepHocru lrcropltqecKoro

pa:arrur

o6ulecrea

nnr

{opr'raponauur rpax.qaHcKofi no3xur{.|

RTr

-

To apply philosophical knowledge for the formation of world view, to analyze the main stages and pattems ofthe historical development ofsociety in order to increase civic engagement

l.

I(araxcranxuq Ka:ipri :auan rapuxu / Conpeuexnaa rcropur

KaraxcraHa / Modem history of Kazakhstan

2.

Pyxaxu xaqrupy / Pyxaxn xaarupy / Rukhani Zhangyru

3.

Oxnocor$Nr / Onnoco{ur / Philosophy

4.

Oreyuerrir xexe carcu

6iliu

tuo4rni / Moayru courtllrt Ho- no,rrrr{qecrnx 3HaHni / Social and Political Knowledge Module

OItp

-

Oneyuerrix opraaa

TYJIFAHbI (AIH IITACTbIPY I(EHC

OHr

-

,{ene ruHHbrKrblpy,ul,rH eaicrepiuen xeue Kypan,[apbrMeH ronbrK(aH.[br

aleyuerrix xane raci6t xut:mer,i xaurauacurr ery, rayinci:aix ua,aeHreriH

l.

,(exe urunuqrrrpy / <Dx:nvecxaa rymrypa / Physical Training

2.

Sxonorx, seri:repi xese ripuririx r<ayincirairi / Ocuogn 9

@ EHy 708-02-21 O6pa3oBarenbHa, nporpaMMa. I43AaHxe Bropoe OM6e6ar xyrurperrhir (OIO/

YHnBepcanhHl,te KoMnereHuHH

(vKy

Universal competences (UC)

l.

lUerer

riri

/ HuocrpaHHufi ,3brx / Foreign language

2.

(a:ax (opsrc) ri.ni / Ka:axcxufi (pyccxr.r[) r:urr / Kazakh (Russian) language

3.

eHepKacin 6oftHarua urQpaux rexaonorrr / l-lnSpoaue TexHorortlll tlo olpacJrsM np[MeHeHHr / Digital lechnologies by branches of application

4.

A(naparrbr( xeue KoMMyHuxawuJlur rexro.nornuap

/

HuQopuauuoauo-roMMyHuxaufioHHr,re rexsororun / Information and communication technolory

5.

Kecinxep.nix xaxe 6xrnec / flpeanprHfiMareJrbcrBo a 6n:uec

/

Entrepreneurship and business

6.

Icxepnix MereHr.rer/ Kynurypa aenosoro o6ueHur/ Business culture

7.

lcrep.lix prlmplrxa /,[e,rouar prrop[xa / Business rhetoric

(11)

aHErKray Ka6ireri, ciurayarrr,r eMip canrhrH ycraHy

YKtr

-

Cnoco6Hocr6 Sopurpoearr u onpeaerrrr

Jrr{rrHocTb B couHaJrbHofi cpene fl opHeHTHpoBarbcr Ha 3aopoBbri o6pa3 xfi3Hl.r

UCr

-

Ability to form and define

a person in a social environment and focus on a healthy lifestyle

Me(fepy, 3xonorfirnbrK xafaafi.[aH xa6aplap 6ony

PO.r

-

O6ecneqrrb rronHoueHHyro courillrbHyro

n

npoQeccuouarrHyro ,[err€JrrHocrb Mero,[aMH

x

cpeAcrBaMn Qn:uvecxofi KynLrypH, Bra.lerb Kynbrypofi 6eorracHocrn, o6raaarb 3xoJrorlfi ecKrlM co3HaHueM

RTr

-

To provide a full-fledged social and professional activities by methods

and means

of

physical culture,

to

master safety culture,

to

promote an

envilonmental awareness

OHs-

Crr6afilac xeMKopJr6rK KyKhr( 6y3yrxbubrnTap MeH KbuMLrcrap

xacayra

xolr

6epMeilriH r+KLrKrbrK caHa MeH KyrtrrKrrrK ruaaexnerrit xerxiniKri aer{refiiHe e 6ony, reciofi MiH,[errepiH opr,rxray xaxe uiuer- KynH( MereHBeri MeH (apbrM-(arHHacrbr4 3TrrKalJrbrK HopMiurapbrH caKTay.

POs-

O6raaarr aocraroqHHM ypoBHeM llpaBoco3y.allvt

u

flpaBoBofi

KynhrypLr, r.rcKrloqarcuuM coBepueHr{e KoppynllxoHHErx [paBoHapylxeHHE r.r

flpecrynneHuii,

ucrorHrrb

npooeccxoHa,rbHHe o6r3aHHocrn, co6rroAarb flpr1HunnH rrynbrypH noBeaeHx, r.r 3TrrqecKue HopMbr 06ueHr.rt

RTs-

To have a sufficient level

of

legal awareness and legal culture that

excludes

the

commission

of

comrption offenses and crimes, perform professional duties, observe behavior culture principles and ethical norms

of

communication

3r(oJror[tr fi 6e3onacHocrlt xt 3HeAenrerLHocrfi / Fundamentals of

ecology and life safety

)l(a.lnrr raci6n ry:uperri,r ix/

O6uen po+eccEoHarbH6re xounereHqxN (OIIK)/

General Professional Compete nces (CPC)

OKurry neTrxe,repi (OIIK uo,rurcpi)/

Pcry.rrrarrr o6yscrrra (earurqbr

OIII(y

The result oftraining (GPC units)

Oqsrry uarNxecix KaJrb!flTacrr,rparHH (Ky3r,rperrinix Monruepi) reH.[ep araybr/

HarueroaaHne ancqnn.nru, Qoprrrnpyrculrx pe:ynhrarhr o6yveHue (e.qrHnqrr ronrnereHun[)/

The name of courses that form results of training (units of competences)

)I(KI(r

- 8p

rypri

rrapaa[r-MirJrapabr

KoraaHa

oTr,rpbrn, 3aMaHayu ri,r4ep4e

nporpaMManay

Ka6ineriHilt 6orryu; xeci6lr KH3Merre Heri3ri xapaTbrnbrcraHy

fT,IJIbIMAAPbIHbIH 3ATIAAPH MEH MaTeMaTlrKuurbrK annapaTTapahr

KOnAaHy;

a(flapaTrhl(

TexHorornflJrapMeH

xeci6ra AeqrefiAe xyMbrc xacay

onlt.-

I]porpaMMrpoBarb coBpeMeHHhrx

Croco6xocru

HA

{3hlKztx c

OHo Keci6u

uacererep,ai

ueuy

KBiH.(e

rrlcrperri

ruareuaruxa, brr(r[MaflablKrap reopltrcH

xare

MareMarrxartt( cratncrlrxaxsrH ruicri

MaTeMarrrKaJrH( annapaTbrH llYPbrc (onaaHy laraHrapbrH Merlrepy

POo

- Braaerr

HaBHKaMT KoppeKrHo npnMeHnrb

[pH

petueBuu

fipo(DeccnoHanbHblx 3a.qaq coorBercrayrourr.rft MareMar[.tecxrri alnapar trHcKpeTHofi MaTeMarlKr. Teopl.rfi BeporrHocrefi

t-t

MareMarfl,{ecxofi

CTAT}tCTH KII

RTo-

To have the skills

to

cor€ctly apply the appropriate mathematical apparatus

of

discrete math€matics, probability theory and mathematical statistics when solving professional problems

1.

MareMarrxa/ MareMaTuKa/ Mathematicsl

2.,{ucxperri uareuarura,/ [rcxpcrxa-r uareMarxKa./ Discrete Mathematics

3.

Kpumorpa$uruu( MmeMarrkzrJrLr( HerbAepi/ MareMar[qeckr,re ocloBhr xpurrrorpa{rnl Mathematical basics of cryptography

4.Kotraau6anu flporpaMMarapatrn naxgrrepinac nporpavuaray/

nporpaMMrpoBanne B nar(erzL\ npfiklalrlaux nporparvu/ Programming in Application Packages

5.

Avnpar xeHe Ko.(my reopxrcr,/ Teoplu ,Hr}opMaum u roaaposatru/

lnformation and Coding Theory

6.

bl(Tt{Man,4HK Tepl-.tfl cH xeHe MareMarrKzulhrK cmrucrnxa"/ Teoprr BepoflTHocrHocre

u

MareMarlrqecxat crarucrllxal Probability theory and mathematical statistics

OHz

- Misaerrix

(ofiburhrMsrg

Koca

arraHAa

xorapri

aexrefiri

flporpaMManay ri,raepiuiH xare vauruHara T ayerai nporpavMirnay ri,raepiniH Hed3.uepiH xrepy, MeceneJrepai ureuy saicrepix rarr.qa[ 6irry, a.mopurvaep.li

l.

C++ TiniH.[e nporpaMManay/ flporpavuupoaauue Ea ,36rKe C++/

Programming in C++

2.

Anropnn'a.aep xaue.(eperrep rqprulrMAapl/ Aaropnruu u crpyKrypu

O EHy 708-02-21 O6pa:oearerruar nporpauua. I4:4aaxe Bropoe

10

(12)

flclroJllt3 oBaHr-reM pa3JurqHbrx

napaalrrM;

HcnoJrh3oBaHr-t, ocHoBHbrx ecaecTBeHBoHa) rHbrx

3axoHoB

Il

MaTeMaTHqecKoro annapaTa

B

npo(DeccfioHarLHor

.(erTenbHocTl4;

Ha

flpooeccrroHanhHoM ypoBHe pa6orarb

c

[rHoopMaunoHHbrMu TCXHOIOTH'M}I

CPC,

-

The ability to program in modem languages using different paradigms;

the use of

basic

natural science laws

and

mathematical apparatus

in

professional activities; work on a

professional level

with

information technology

rarlJ(ay HeMece KYpy, nporpaMManay ruuEtr€ anropr.rTMAepar xY3ere achrpy, flporpauMaHbr erutey ver recriney xlpri'lyai lrrepy

PO?

-

Bna,u.erb ocHoBaMu flporpaMMrpoBaHlu Ha ,3r,rxix Br,rco(oro ypoBH, r-r

Ha Ma[II{HI]O-3aBt,lcI-tM6IX

'3bIrax npofpaMM[pOBaHlrr, BKJITO!{Zl' IOCTaBOBKy

3aAaq[, yMeuue

arr6rparr

M€ToAbr perxeHfiq 3aAaqu, co3.[aBarb rn[.t

Bbt6xparb

arropr-rrMbr, peaJrx3oBbrBarr,

it ropnrMbt Ha

r3brKe

npofpaMMltpoBaH[.1,, npor]3Boat-tTb oTJralhy r.r TecTupoBaHr.re nporpaMMbl

RTr-

To master the basics of programming in high-level languages and in machine-depend€nt programming languages, including setting a problem, the

ability to choose methods for solving a problem, create or select algorithms, implement algorithms in a programming language, debug and test a program

aaunro</ Algorithms and Data Structures

Python riniH,le nporpaMMaJray /Ilporpauurpooaare Ha ,36rKe P]thon/

Programming in P),thon

Crpum riraepiuac nporpaMManay /llporparrMxpoBauxe Ha cxpumoBlrx ,3EIK&V Programming in Script Languages

Java-ga

o6Terrire

6arslrra,rran fiporpaMM:rnay/ O6'uerrso- opueErapoBaHHoe rporpaMMUpoBaHue Ha Java./ Object-Oriented Programming on Java

llporpauuarur koarH TaJL{ay

xetle

or{rainaHrLrpyl Aaanta3 n

om[MD3auH, nporpaMMBoro Ko,[a/ Program Codc Analysis and Optimization

Xyienir

nporpanarua,lay /CxcreMHoe nporpaMMxpoBanue/ Systems Prograrnm ing

I

OHo-

I-lut$prurr cyl6anapaut4

ap rypni

ronnouerrrepiH anu4ray, curl:rnaap,4br ua$prut< ortaey rrpnH[Hnrepix

xere

crruarAapau xi6epy reoprrcuru 6iry xeHe orapabl xaci6n ecemepai ueuyae xon,laHy

POr

-

,(euoncrplrpoBarb 3HaHxr: 06 apxrreKrype Bbr.{r-rcrfiTerbHoii MauruHbr,

o

npltH[uflax opraH[3aqxu MHor-olpoqeccopHbrx

lr

MHoroMau[HHr,rx BhrqucJraTelbHbtx ct-tcTeM;

o

HanpaBneHr-rrx pa3BxTr-rrr KoMnbrcTepoB c

rpa,[HuxoHHo,l, napannenbHofi

r

Herpa.[rqroHHofi apxureKrypofi; o

fipuHuHrrax

noclPoeHfi,

coBpeMeHrirJx KoMnr,roTepHbrx

ceTefi

u QyuxquoHrpoaarur ocHoBHblx

ypoBnefi OSI; o6

opraHr.Bauuf onepaqxoHHLrx cr{creM

r

o6ecne,{eBl{lt

rx

6e3onacHocrn;

o

Hacrpofixe rroJrrrnxr-r 6elonacnocrn oflepaurroHulrx cr{cr€M r-t xoMnlrcTepHLrx crcreM rr ceaeF

RTr- To

identi$ the various components

of

digital circuits, know the principles of digital signal processing and the theory ofsignal transmission and apply them in solving professional problems

Axnaparr6rK rcayincir.qirre Kipicne/ BBe.[eHle

I

HHOopMaulroHHyro 6caonacHocrb / Introduction lo Information Security

Kounrroreprix atnaparrLr xopmy rexHollorrrrlapb/ Tcxgoror[! 3aurrLr xoMnEErepHo rBrDopMaruu/ Technologies

of

Computer lnformation Protection

Ey,rrr6r( TexHonorxrnap xerre 3arrap Hnrepueri/ O6ra,rxlre rexHoJrorru

r l,Irrepuer eeqefi/ Cloud Technologies and tntemet ofThings

Ecem€y xyfienepiHiq annapamrrq xa6,[HKra,{ac6r xeue BfipryaJuay TexHonon rrapL/ AnnapaaBoe o6ecneqeuxe ButrucJrrrerrbrl6rx cLcreM, rexHoJrom! ouprya,ruoauru/ Hardware of Computational Systems and Vinualization Technologies

Onepaunerur xylerep xere OX (ayinci3,[iri/ OnepaurroHH6re crcreM6r n 6e3oflacHoq'rb OC/ Operating Systems and OS Security

E

OHo

-

.(epexrep 6a:arapuuurt" oflepaqurnuK xyfienepairl, xounrroreplir

xaHe

reJrexoMMyHr.{Karr}rrlrhr(

xerilepain, ecemey

xyfienepiHi(

Kayinci3,airiH KaMraMacr,r3

ery xeHe

oacrapy aarasurapHH xopcery;

a(naparrblK

rayincir.airri

KaMTa {acH3

eryni(

nporpaMMilJrHK xane TexHEl(itnbrK r(+pauapbrH KonaaHy

POe

-

,(euoucT papoBarb HaBuKl, arMxHxcrpt-tpoBaHr-rJr

lr

o6ecneqeHlu

6e:onacxocru 6ag aaHnux, onepaqr,roHubrx cxcreM, KoMnblorepHblx r-t

TeJIeI(oMMyH[KaufloHHErx

cerei,

Bbrrrfi cJrflTeJrbHhlx cacreM; [cnorL3oBarb nporpaMMfibre t,| TexHrrqecxHe cpeacraa o6ecne,reBr-{, rrHoopMauHonHofi 6e:onacnocu

RTs- To

demonstrate skills

in

administration and securing databases

Aepemep 6a3anap6! xaHe onap,4Hq rqayincirairi/ Ea3H aaBHLx

s

rx

6e3onacHocr, Databases and Their Security

3rru

xemipyrui nporpaMMaJrtlK (zuraMarafi (op.arry/ 3auura or

BpeaoHocHoro nporpaMMroro o6ecn€geflrrl Protection against Malicious Software

Kounrroreplir xere reJreKoMMyHxKaunrnEr( xyfienep/ KoMnEorepHHe u rereKoMMyHrKaur,roHsrre

cqul

Computer and Telecommunication Networks

KoMn6rcT cpni( xene relexoMMyHr,rKalluarrl xlfiorepaiq rcyincbriri/

6E:onacgocrg rounttorept 6lx r aerexoMMynuxaqfioHBrrx ccrefi/ Security of Computer and Telecommunication Nctworks

O EHy 708-02-21 O6paroeare,rrxar nporpaMMa. l,baarue aropoe

LL

l.

2.

3.

4.

(13)

operating systems, computer and telecommunication networks, computing systems; to use soliware and hardware to ensure information s€curity

Kaci6n ry:sr perri,r

ir/

llpooecclIoHan6I|r,re KoMnereHulllI (IIK)/

Professional Competences (PC)

O6ury uaraxe.repi (IIK rue,rurepi)/

Pery.nrraru o6yqeHEq (eauulrusr fl K)/

The result of training (PC units)

Orttry

Harnxecir KarutrrracrHparbrH (ryaurperri.nir ruo.nruepi) naHAep araybr/

HaulreroaaHEe trHcuflnnuH, QopMrrpyrounx pe3ynb'r'a'rbl o6yqeEEc (enrrHlluu rounerexuuii)/

The name of courses that form results of training (units of competences)

KI(i

-

Teyexeuepli, axruarepgi,

unurAerrrepai,

6a:secri{

\Bnitci3nirin 6acrapy,

Kayia-

KaTepnepfe (apc6r epexer ery,

Kayinci3.[iKri

recrirey,

ocarrHnH Krap uea rayin-xarep

npouecrepiH

KaMTurblH

a([aparrbrK

4ayinci:giKri 6acxapy

MeH

KaMTacLr3 ery flpouecrepiH xY3ere acbrpy xeHe 6ara,ray aaicrepin ranaay, Ta(tray

xene

KorraHy xa6herrepiain

6o,.ryu

III(s

-

Cnoco6nocru aHalrx3apoBarb,

au6rparu

u

[pI]MetIrTl, MeToabI oqeHKIt LI

pqrnx3au

r

npoueccoB

o6ecneveHu,

t-l

ynpaBneHx,

xH(DopMauuoHHoil

6elonacuocruto, oxBarbrBaroluux

flpoueccbr

ollp€IeneHr|,

yr3BuMocTe u

yrpo3,

Tecrr-.rpoBaurfl 6conacuocrN, npoT[Boae

cTa[,

yrpo3aM,

yflpaBneHHfl pracKaMtl, aKruBaMri, I-THTIXAeHTaMI-t, HenpepbrBHocTbro 6l,tsHeca

PCs

-

The

select and assessing processes

ability to

analyze,

apply methods for

and

implementing

for

ensuring and

OHro-

Kovnuroreprix a{naparrlr ropray aaicrepin, x+pan,qapbrH xeHe TexHoJrorrrrJrapbrE (oJlAaHHn, yfibtMHblt( AI( 6aurauacrrr ery 6ofiuHura ic- uapanaprH xocnaprafi

6i,ry. Axnaparru(

Kayinci3nix caracHHrarr,r

xrr:uemi perreiiris seri:ri

xaJrhrKaparhrK xeHe

ynrru(

3a{HaMarr6r(, yfir,rM,racrr,rpyrubuhr( xaHe npoueayparHK axrirep,ti xo,raana orlrpun, aKfiaparrbr{

xafibulLrr xeryix illlAbrH

zllrarbtH

xyie,repin,

AK uourropuxri.ney xyierepiu, ocanrbmbrKrapabr uoHlrroprxrirey xyfie,repiu,

AK

(avraMacus ereriH annaparrbrK-nporpaMManbrK Kypa"laapbrH KonaaHy aaFAbrnapHH Me[repy

POro- Vnerr

[puMeHrrb MeroAbr, cpeAcrBa

r rexHororr[

3aur-rrbr

xoMrrbmrepHoi NnQopuaura, ruraurrpoBarb Meponpl,lrrx, no o6ecneqeH[ro HE opraxnuuNx. Braaerb HaBhrxaMr nptlMeHeHH, an[aparHo-rrporpaMMHbrx

cpeqcrn o6ecne,reuar

l4E,

cxcreu MoHrlTop[Hm yr3Bl-tMocrefi, c[creM MonuropuHra

I4E s crcrev

[peAorBpaueHnr yrevex ruQopuauut c

[cIIoJIb3oBaHBeM

6a:osurx

Mex(AynapoAHr,rx

E

HaulroHarbBbtx 3aKOHOAaTeJrbHbrX, OpraHu3aqrroHHr,rx l,l npoqelypHbrx axToB, perynflpyrcur|x aerreJrbnocrb B o6Jracrlr uH$opuaqrouuofi 6e:onacHocrlt

RTro

To be able to apply methods, means and technologies for protecting computer information, to plan me:lsures to ensure the organization's [S. To possess the skills

of

using hardware and software tools

for

information security, vulnerability monitoring systems, information security monitoring systems and information leakage prevention systems using basic intemational and national Iegislative, organizational and procedural acts regulating activities in the field of information security

l.

Kounrorepaix axnaparrlr Kopray rexloaorauapr/ Texuoaorflu 3 rlmbr roMnbrcTepHofi unQopuauar-r/ Technologies

of

Computer Information Protection

2.

A(naparr6l( myiflci3.ailrTeri xacaluru nurerlreKr aaicrepi/ McroAu r,rcKyccrB€HHoro HHTennerra B uHdopMaluoxsoi 6glonacsosru/ Anificial Intelligence in lnformation Security

3.3m8

xerripyrxi nporpaMManbrK KzMTaMa.raH (opmfly/ 3aurrra qr

BpeloHoanoro nporpaMMHoro o6ecne,icurrcl Protection against Malicious Software

4.

A(naparr6r r<opray ruxeueplir-rex l-rkrlnBr( rypa.uaps/ I4HxeHepHo- rexHflqeckue cpercrBa 3atqxrbr uuQoprvauuu/ Engineering and Technical Means of lnformation Protcction

5.

EacHn kipyai aHHKray xeHe a&l6rH

any xyierepy

CrcreMbr

o6HapyxeHEx tr npeAorBparu€H]tx aropxerufi/ Intrusion Detec(ion 8nd Prevention Systems

6.

AK[aparrbrK rayinci:airrir crauaprraptr ueu uoplaumix-rcgxurrrux

fleri3Aepi/ Cranaapru u

HopMar[Buo-npaaoBue ocuoBbl BEoopMaunoHHo 6Bonacxocrrr/ Information Security Standalds and Rogulatory Bases

7.

AepeKrepli ra,raay eaicrepi/ MeroIH aHarx3a.qaHHErx

/

Data Analysis Methods

8.

ArnaparruK myincia.qirriq ayftrru xeHe 6acKapy/ AyIrfl x ynpaB.[gHxe ,HoopMaunoHBotr 6e:onacHocrHo/ lnformation Security Audit and

Management

p.

Kx6epxayinci:airreri xa6apaaprurrrrr aprrurpy/ nosuruerne ocBe,uoMreHHocrr.r

a

xr6ep6esonacxocru/

Cyber

Security

Awareness OHrr

-

[lporpanu:rnap MeH a(naparrr,rK xyEelepai xo6aray xaue xayincir

e3iprey, KoMnLprepnix $inMHcrapIHH :rn.[ErH a"ny

xaHe

3eprrey ,laubrnapblH urepy. fleperrepai xHHay, e(trey xeHe KalnbrHa Kenripy yruiH nporpaMManH(

xeHe

rexHHKirJrhrK rqpalr,[ap,qbr KonAaHy. AKnaparrr,r 6a4sr.ray, 4yxarray xoHe (opraylLr x\,Bere acHpy

POI

-

Braaeru HaBbrraMu npoeKrrpoBaHlrr

u

6e:onacaofl pa3pa6orKx

l.

A(naparrrrx xyIerepait nporpauuaauK xomnoxenrrepiniu rayincirairi/

E€3onacuoq-r6 flporpaMMnbrx xoMnoHeHToB urQopMaqnorrnbrx c[creM/

Security ofSonware Components of Information Systems

2.

OafiuLrK xyfienep,{i rpxMunaJtlEr( raaaay/ Kpuuuua:rxsrx'{ecxxfi aHarM3 oatrnoBLrx cllcrcM/ File Systems Forensic Analysis

l.

fiporpaMManHK KaMT,MaHurH rayinciuiri xeHe 3rrnabt Ko,{TH jeprTey

slicrepT E*onacuocrs rpomaMMHoro o6ecfleqeulr,

t-r

Mero.(6r

O EHy 708-02-21 O6pa:oeare,rrnal nporpaMMa. H:Aarue aropoe

72

(14)

managing information security,

covering the

processes of identirying wlnerabilities and

threats, security

testing,

countering

threats,

managing

risks,

assets, incidents, and business continuity

nporpaMM

I

uxQopuauuogur,lx chcreM, HaBbrxaMu npe.lorBpauegu, r.t

BeAeHH, paccJreAosaHnfi xoMurrorepHbrx flpeqryuneHt,ltr. HcnonL3oBarb [porpaMMHHe

r

rexH]trlecr(He cpegcraa c6opa, oopaoorxl-t r-t BoccraHaBJresfirr

.[anHr,rx.

Ocyuecrarrrr ro]flponb,

AoKyMeH

rpoBaure l,t

3auury

rrHoopMaunx

RTrr

-

To possess the skills of designing and safe development of programs and information systems, the skills of preventing and investigating computer crimes. To use software and hardware for data collection, processing and recovery. To control, document and protect information

rrccrc.qoaaHu, BpeaoHocHoro Ko.tal Software Security and Malicious Code Research Methods

Kopl"JraH a(naparrbrK xyrenepAi $ipney xoHe naiLqanaHy/ Pa3pa6or(a

t-r ](cnnyaraur, 3ar{rureHB6rx uutloplaulrourrx cucre

{/

Secure

lnformation Systems Development and Operation

Ufi$pnHt< kpr{M[HanxcrxKarrlr1 xeris.qepi/ OcrioeH un$poBofi rpauunaaucrard Digital Forensics l-oundatioos

Eac6rn Kipyai recri,reyl Tecrapooaurc Ha npoHH(HoBeHxe/ Penetmtion Testing

Xeriaix xase vo6r:rsai rypslrrutnapr? Kpr.lMlHarulor( caparraua/

Kpunruraaacrarecrae 3r(cneprx3a cereBux

u

Mo6urt HL,tx ycrpoicrB/

Forensic Analysis ofNetwo* and Mobile Devices 4

5.

6.

t

AKnapar xcHe kolTay reopxecLr/ TeopH, r.iH(DopMauH,i u ro uponaxrr/

Information and Coding Theory

Kpt-rrrorpaQurnu4 MareMar[r(a.fiLrK Heri3,{epi/ MareMarxqecKHc ocHoBbl t(pxmorpaoru/ Mathematical Basics of Cryptography

Kpfimonorxr/ Kpnmonorsr/ Cryptology

KprnrorpaQrr,rur [poro(ontap/ KpHnrorpaolr'iecKI,le nporoKonEr/

Cryptographic protocols

CTe.aHo.pa+m aaroprm,r,4epi x.re t<+paltaapH-/ Anropr.Msr t-r cpercrBa creranorparlx/ Steganography Algoritims and Means

I

t

OHrr

- Kaci6u

MacerenepAi

uetuy

rq3brp€TriJririn

xene

6i.nimai HHrerpauxrnay Jla.abuapbrH Meqrepy

POr- Blaaerr

KoMrrereHr1nflMn perueHx, [poQ€ccuoHalbrHx 3a.qaq H

HaBHXaMIl HHTerplpOBar rr 3HaHXfi

RTr-

To have the compet€nce

to

solve professional tasks and skills

of

knowledge integration

l.

.[nruouar4u nparrara./ flpe,agunrouraa nparrura./ Pre-diploma practice

.

Oxaipicrix nparrnra/ flpor:aorcraeuxar npaKrlfl(a/ Industrial practice

<D EHy 708-02-21 O6pa:oaare,rluan nporpaMMa. I,l:4aaae aropoe

13

OHrz

AKnaparrap MeH KoATay reoptrrchrur,rt1 Heri3AepiH, rexnror?a$fi,

xeHe

f,T)t4rnorarl.uay cirIracr,rHAa

$opuals4u

annaparr,rH, neri:ri rpunrorpaQualuK ;rnroplrrM[ep MeH xarraMaJrapbrH Me(repy xaHe onapaLr AepeKrep.Ei (opray MeceneciHAe (onqauy

POrz

- Bra.qsrr

ocHoBaM[

Teopxl

t{HQopMaqr{x

fl

Konr-rpoBaHlx,

tlopua.rrxuu anflaparoM

B o6nacr[

l?nnrorpaQuu

a

KprjaroanaJu3a,

ocHoBHl,lMl.t rpanrorpaQu,recxrMu alrropurMaM[

r

rrporoKoJraMn H

[pHMeHrTh ]rx B 3aaaqax 3aruuTr,r aaHHbrx

RTrz

- To

posses the basics

of

information theory and coding, formal apparatus in the field of cryptography and cryptanalysis, basic cryptographic algorithms and protocols and apply them in data protection tasks

Ақпарат көздері

СӘЙКЕС КЕЛЕТІН ҚҰЖАТТАР

selfknowledge EDUC 22004 O,reyuerrix neaarorHKaJlblK uoly,r u/ Couraruuo- fieaaforr!ecxrfi mo4y,r u/ Social-pedagogical module AP 2705 SP 2205 SP 2205 Oreyuerrir neaarorura