JI. H. I-YMHJIEB ATbIHAAFbI EYPA3I,I,g YJITTI,I( YHI,IBEPCIITETI EEKITIJIAI
(JI.
H. fyMuneB af
rrrsrl.ru Ker{ecxarrava
J\bBac4apua
EIJIIM BEPY EAfAAPJIAMACbI OEPA3OBATEJII,HA,I TIPO| PAMMA
EDUCATIONAL PROGRAM
VAYnrrbrK yHtIBepcrrTeTi))
0l
E. B. CLusrxos
Kagp.napllur
gaiiuugay 6arsrruHulrl
arayr,r xoHe Ko1r,r:Koa
u rraruenoBaHHe rranpaBr'reHrrq noAroroBrcu KaApoB:Code and names of area of
training:
6B063-ArnaparrlrK Kayinci:,1ir<
6B063-HHdopvauroHuaq 6eronacxocrs 6R061-lnformation Securitv
2021
xsr,rrur rqaburgay/ Ilprrcll 202l
roaa/Admission
2021 4 Nsur4 roaa 4 yea:.
Ei,rirlirircAenrciii/YponcurxRa,ru{unaqur/Qualificationlcvel:6YEIII,6EBUI/6IIPK,6EPK/6NQF,6EQF
O EHy ?08-02-21 06paroeare,ruuar nporpaMMa. H3larrre Bropoe
Eargap,ra*ra
golre
iri,/Yponeusnporparrlrrr/Program Level:
Eara,raepuar/
Eaxa,raepuar/ Bachelor6B06306-4rrnaparrsrr nayinci:air xvfi e,'reoi
(61118 (Eny 6a apna ncuHu( ara) u xrtrc xonH)
6806306-Cr-rcreuur undlopr'raunorrrrofi 6egonacuocrn
(Koa B flarMeHoBarrnc ofipaioBarcrb on porpaMMU) 6806306
-
Information SecuriW Svstcrns(Codc and name of eduqrional protsraN)
O6r,ny71r,r11
rurrrir lreprimi:
Tnnnqrrurir
cpom o6yuenun:Typical period
of study:O3IPJIEIEH / PA3PAEOTAHA / DESIGNED
AraIeMr.rsrHK xonrurer/Arageurve
Caru6arlusa
.II.X
( Aru-x€Hi/OI,IO/Nante)
rer/
Academic Committeef,!ru4/
tp.ot ,t-r
1z
Pagaxosa B. I
Il.
rAru-xori ofiO N., n()
(Aru-xoni/Ol,lO/Nrnrc)
(ndd;rl(o,"^is,"r,,,")
(mlnucJkon6rsis anrre)
Je oa A)
P*rz J2 rS 2,
OcuaHosa
A.
B.(Aru-xoxi/OltO/NiNe) r,@ffieon6,r\*,t*e) Type6aeEa
P.lL
(Aru-x6Hi/OHOlNrn,e) ( roaoncL/(on!rsiSnahre)
Xyr'rurc 6epyui
/Pa6orogare,rr/ Employer:
B:liu
anryunr/ O6yqaroqrftcs/
Student:Kamxsrs6afi B. E.
( A16r-x6H i/Ol,lOlN ame ) ( noanrc6/(onH/signature)
( Aru-xoH i/OHO/Name ) ( fl o,uorc[/(orrB/si gnalure)
/'k 4-
D? lJ
Eu,rs O. B.
AO
(fTC)
rAr xotsi'OHo N n,.)
Crurrron
,II.M.
(Aara/KyHi/date )
Ceuros [I. X.
(ArLr xeHi/OHOlName)
t noanaca/rioruf i gnarure t
)l.oP 2,
(Atu-x6si/Ot{O/N.nte)
(APACTbIPbIJI.qbI / PACCMOTPEHO / CONSIDERED
AxaAeur,u:ru( xeqec orbrpLrcBrHAa./ Ha raceaasuu Axaaeunqecxoro ooBera /
At
the meeting of the Academic CouncilKyni
/4ara/
dalsld. O/
20X-/
xanavra/
nporor<o.n / Record J,.lb,Z
EEB capanraruanay
ce(qltscbrHlr{
'reparacEr/
flpegce4areas cexrlrru3xcnepruru Ofl
/Chairmanofthe
Expertise Sectionof
Educational Programstt ol tt
4u 2l oa
(Aarrkylri/datc )
_ ,{N2./
YCbIHbIJIAbI
/PEKOMEHIOBAHO
/RECOMMENDEI)
AraAeunrluK
reqec orslpbrclrHAa/ Ha saceAanulr Axa4errauvecroro coaera./At
the meeting of the Academic CouncilKyui/gara/date !. ( .o)
20 J-.1xarrava
/npo'roxo:r/
RecordNs 2
Orqy ici
xoniu4eri
npopexrop/
no YP/
Vice Rectorfor
AcademicAffairs
Onrap6aen E.
A J[', 02 pl
(,qara/qri/date)
Carnaesa C. K.
(
KEJIICIJIII / COIJIACOBAHO / AGREED
Oar<ylsrer gexausr /flerau Saxylrrera /
Dean of Faculty<D EHy 708-02-21 O6pa:oaarerrxar nporpaMMa. Ll:aauue aropoe
I
MA3MYHbI/ COAEPXAHI,IEI CONTENT
Eirir'r 6epy 6ar.qaprauacnnuq nacrop'rs/ flacnopr
o6pasonare,rruofi nporpauur/
Passportof Education Program
2. I(ysnperri;rix/6eftiH rapracu/ Kapra/npoQum roMnsrenqu /
Map/ Profile of
Competences3. Eiair',r 6epy 6ar.[ap:rauacusuH uasrryuu/ Co.{epxaHue o6pa:oaarorruofi nporpauuu/ The content of the education program
4.
Ei.rrirr.r6epy 6ar.qap:rauacuHuq lro.4ylr4epi 6e,riniciHae
urepirrex rcpe.qurrepAiH xoreuiu xepcere'riu
xubrHrbrKrecreci/ CsoAlra, ra6rlrqa, orporarouau o66ela ocsoeuHux
Kpe.(rnoB B pa3pe3enoAyrefi o6pasonarearuoft nporpauun/
Consolidation table displaying the amount of obtained credits within
themodular
educationprogram
4
9
t4
28
5. Biriu 6epy yaepiciH yfinugacrupy/
29o6paronareruroro npoqecca,/ Organization
ProcessOprauu:auux
of Educational
3
O EI{y 708-02-21 O6pasoaare,rruar nporpaMMa. I.I:aaaue aropoe
Bi.riu
6epy 6argap,ranacuHbrH rraclroprbr/[Iacnopr
06pa30Bare,'rbHoil rIporpaMMr,r/The
Passportof Education Program
(o.ngary caracu
O6.nacrr rrpuMertenriflApplication
areaEirirtr 6epy 6araap.irauacu a(raparrbl( xayinci:aix
caJIacLIHAarbI 6ara.nanprap,ur aaft srHAayra apxa.rraxO6pa:onarearxaJr nporpaMMa [pe.qHa3HaqeHa
.qu
ro.qroroBKrr 6ara,ranpoer
o6:racru r.rx([oprrraquoulroft 6esouacHocruThe educational program is designed
to
prepare bachelorsin
cybersecurity areaEi,rilr
6epy 6arqap.narracrrHsrrlKOAI,I MEH ATAYI,I
Koa u
HanMenoBaurre o6pa:ooare;ruuoftIIporpaMMbr
The code and name of
educationprogram
Hoprrarnrrin-
KYKbIKTLI K
I(alltrlr!'IybI
Hopvrarunuo-npaBoBoe o6ecneqenlreThe regulatory and
legalsupport
-2007 xsurgsrq 27 wtueteri
Ne319-lll Ka:arcrau
Pecny6rnxacuHurl<Eiair'r rypamr>r 3aHsr. 2020
xrrrabrH
7uriueaeri
Ne361-VI
earepicrep MeH TonbrKrbrpynapMeH- 31.10.2018 x.
Ns604Xorapr,r 6iriru 6epyaiq neu.nexerrir
xarrrrbrra urisAerri craHAaprEr-
30.10.2018x. N595 Xorapru xeHe
(HeMece)xoraprr o(y
opHbrHaHreiinri 6iniu 6epyaiu 6iliu 6epy
6argap:rauarapuHicKe
acLlparsrH6iriu
6epy yftsnrrgapu(ugMeriHiq ylrinix 4arugalapu,
18.05.2020x.
J\b207 esrepicrep MeH roJrbr(TbrpynapMeu
-
12.10.2018 N. Ns563O4uryaun
xpear.rrri( rexHo,lorHrcbr6ofisrtua
o4y npoqeciu yfiuuaacrupy
Karu.qa"'rapbr- Xorapri xaHe xorapbr o(y
opHLrHaHxefiinri 6iriui 6ap
xaapnapau Laupray6arrnrapnHrq
crrHbrnrayb[rrLr-
05.06.2020x.
Ns234 xaHe 13.10.2018x.
Ns569 KPExFM 6$psrrsrna
6ocsruura-
"A4naparrurx un$paqprusrrr.r xaHeAT rqayinci:1iriu 4auralracu: ery"
xoci6u
cranaaprr,r- <Aralrexeur
I(a:aKcraHPecny6ruxacu Yrrrrt(
Kacinxepnep flaJraracr,rHbrq Bac4apua Teparacrr opun6acapsrxuq 20 I 9
Nr,urrt 24
xellro(caHAarbr No 259 6yfipsrrsrHa 34-4ocuuura(1
uycr<a, 2019x.,6oaxaaAn (aira
Kapayxyui:
30.12.2022x.)
- fI EYy 708-18 JI.H. fyrrruaen arbrHAarrr Eypasut
prrrrbrKynrlnepcureriuiu Ei,riu
6epy 6ar.aap.nalraaapuH asiprey,capa[ray
xaHe 6er<iry 6ofi rrnura pecirrli<I{uQpnurq Kasa(craH> lrer,.uexerrir 6argaplauacu I(P Yrirrreriuiq
12.12.2017x. N827 I(aymrcrrueu 6erciriaai (P YxiMerinin
12.12.2017xlulrhl No827
(ayJrr,rcbrMeH6eriri:rreu <l]uQp::rN
I(asaKcraH>rrel.rlexerrix 6araaprauacu.(aga(crau Pecny6lr.rracrr YnrrtK
xecinxep:rep [aJraracH < AKnapa'r'rrr4
xayinci:ziro Eac4apuacrmru
xoci6u craHAaprbr <A'rauexes> <EI( Cay:reruinep >, (05.12.2018x.,
No 330);<A4naparmr4
aH(f parqyprurrnrrves AT xayincitairin
(aMraMacbr3ery),
(05.12.2018
x., No
330);<XacanAu lrHreJr.reKr (ocr,rMrxanapbrH ssip:rey>, (05.12.2018
x.,
No 330);<Eugxec -aHanr.rrr.rKrep xaHe
IT
-xo6a,'rapabr 6acxapy> (05.12.2018 N., No 330O EHy 708-02-21 O6pa:osarenrxar nporpauua. I4:aaxue nropoe
6B06306-AxnaparruK r1ayinciaaix
xyrienepi
6B06306-Cucreuu
unQopuaquonnofi 6egonacHocru 6806306-Information Security Systems4
- 3arou Pecny6;ruru Ka:axcran <06
o6pa:oeauvtu>or
27.07.2007 r.Ns3
l9-lII
c r.r3MeHeHr.rrMu r.r aofloJrHeHrrrMuor
7uxns
2020 r Ng 361-VI- locyaapcroeHsufi o6uleo6s:arearuuft
craH4apr Bsrc[rero o6pa3oBaHuor31.10.2018r.Ns604
- Tunosue [paBr.rJra AerreJrluocrr,r opraHrr3arlr4fi
o6pa3oBaHur,peanr-r3yrcqax o6pa:oaaremnrre lporpaMMbr Bbrcuero u
(lu'r.u)locneBy3oBcroro o6pa3oBaHr,r,
or
30.10.2018 r.N595
c H3MeHeHr{rMu r,rAoronHegr.rflMr.r
or
1 8^aas
2020 r. Ns 207
- flpanara
opranu3arluuyqe6uoro
npoqeccano
xpe4u'ruofi TexHoJrorurr o6yueuur.or
12.10.2018 r. J\b563- Kraccurfnxarop uanpasleuui noAroroBKu
Ka,qpoBc
Bblcrtrr,tM n locJreBy3oBcKrrM o6pa3oBaHr.reM- flpxroNeuue
K rrpI,rxa3yMOH
PKor
05.06.2020 r.
N234
uor
13.10.2018 r. Ns569-
flporfeccuouamnuft craHAapr <O6ecue.{eHue
6egonaorocruuxtfoplraqrouaofi
rrHQpacrpyKTypbrr{
I,IT>-
flpr.r:roNenueNs34
x npuKa3y 3aMecrurgrq flpe,qceAa'renr flpao:reHur Haquonaaruoftnararrr npe4npunuvarerefi Pecny6lurlr KasaxcraH <Arauerceu> or
24.12.2019
r. Ns 259 (aepcur l, 2019 rot, aara
opneHrrrpoBoqHororepecMorpa:
30.12.2022r.)flpoqegypa no
paspa6orxe, 3Kcneprr.r3e u yrBepx.qeHaro o6pa3oBarenbHlrx aporpaMMn EHV
alr. JL H. fyrlru:reaan EHv
708-18locy4apc:rrenuar nporpaulra <l-{u1|pooofi Kaeaxcrau), yrBepxAeHa rocraHoBrrer
{eM flparu:renrcrna PK Ns827 or
12.12.2017 r.flpoQeccr,ronalrHufi
craHAapr <I4xrf opuaqnonnas 6e3onacuocrb)flpanneuue HaquoHamuoft rraJrar6r upe4npuuuuarelefi
PK<Arauexeu> <Apxarerropu flporpaMMuoro
o6ecneueuul>, (05.12.2018 r. Nr330);<O6ecneqenue 6egonaorocru uuQopuaquounoft
unrppacrpyrrypu
u I4T>, (05.12.20 I 8 r. Ns330);<Pa-epa6orxa npraoxenuit HcKyccrBerrsoto
r.rHTeJrJreKTa),(0s.12.2018 r. ]ll!330);
<EusHec aHirrHTLrK.r
a
yflpaBneHr{e npoeKTaMa I,IT>>, (05.12.2018 r.Ns330);
-
TheLaw of
the Republicof
Kazakhstan "On Education"of
Jt:'ly27,2007
No.319-lll with
amendments and additions of July 7,2020 No. 361-VI-
State compulsory standard of higher educationof
3 1.10.2018, No. 604- Standard rules for the activities of educational
organizationsimplementing
educationalprograms of higher and (or)
postgraduate educationofOctober
30, 2018 No. 595with
amendments and additionsof May
18, 2020 No. 207- Rules for organizing the
educational processon credit technology of
education
of
10. 12.201 8, No. 563- Classifier of
areasfor training
personnelwith higher
and postgraduate education- Appendix to the order of the Ministry of Education
and Scienceof the
Republicof
Kazakhstanof
05.06.2020No. 234
andof
13.10.2018 No. 569
-
Professional standard "Ensuring the securityof
information infrastructure andIT" - A
endixNo.
34to
the orderof the
De u Chairmanof
the5
O EHy 708-02-21 O6pa:oaaremxar nporpauraa. I,lr.uaune aropoe
"Atameken" Board of the National Chamber of
Entrepreneursof the Republicof
Kazakhstanof
24.12.2019, No. 259 (version1,2019,
dateof
tentative revision: 30.12.2022)
-The
procedureP ENU 708-18 for the
development, examination and approval of educational programs at L.N. Gumilyov
ENU- The state program <Digital
Kazakhstan>approved by
decreeof
theGovemment of RK Ns827 of 12.122017 State program "Digital
Kazakhstan", approvedby the Resolution of the
Governmentof
theRepublic
of
KazakhstanNo.
827 dated 12.12.2017. Professional standard"Information
Security" Boardof
the National Chamberof
Entrepreneursof the Republic of Kazakhstan "Atameken" "Software
Architects", (05.12.2018, No. 330);Ei,riu
6epy 6argapa,rarracr.r aflcbrHAa aafir,ruaay6eftisinin xapracr,r/ Kapra
npoQu,rq ro.uroroBKrl B paMKax o6palonare,'rsnofinporpaurvrtl/ Profile Map
ofEducation Program
EE rraKcarrr Ile,rr OII
Objective
of EPKeci6u KH:rtrerreri xypae:ri uacere:repAi rueruy xesilrAe aKnaparrbr Kopray
eaicrepiu
KonaaHa aJrarr,rH,Taunayrbr
apryMeHTTe[,ra.flaay xyprige
6i.:reriuiu6epxayincis4ir
ca:racbrHAa 6acexere rca6i::erri 6ar<a:ranprapau 4aftnu4ayf]o,qrorosxa xoHxypeurocnoco6urx 6axaaaopoa a o6racrs ru6ep6eoonaorocru, cnoco6nux
anarr,r3l,rpoBarb, apryMeHTupoBarbau6op, npuueu-rrl
Meroabr 3arrIHTLr raHtfopuarlulrflpfi
peureHr,ru cJroxHr,x sagau a nporf eccuonarurofi .(esreJrbHocrr,rPreparation
of
competitive bachelorsin
thefield of
cybersecurity, able to make decisions, analysis,justification,
applicationof information
security methodsin
solving complex specialized problems and practical problems in professional activitiesEi,rinr
6epy6argap,ralracrrnrrq
TYxbrpbrMAaMaCbrKonuenquq o6paronare.rrnoii uporpa
rnrbrThe
conceptof
educationprogram
Biriu 6epy
6argap.nauacrr6iriu 6epy y.uepiciu xy3ere
acbrpyabrlMa(catrapbu, neruNerepiH, MzBMyHsrH. rrraprrapu
MeHTexHoJrorurJraprrH,
ocbr 6arurraru ry,rerrepai Laspnay
ca[acLrH6ara.nayau perrefiai NaHe 6inilr
a:ryrxbrJrapAbrnAafir,rsAsr(
canacr,rH(aMraMacbr3 ereriu Marepfianrap.4br xaHe rr.ricri 6i,riu
6epyTexHonorflcnapbru
euri:yai
(aMrrlaLr. EEepexrueriri
rpunrorparfur
xsHe KpullroraJr.qay caJracbrH.[a tfopr'ran4sr annaparrbrnrepy; iruxi
xyfie:repre, (ypburrbrJrapra, aKnaparr!,r(-KoMMyHuxarlurnbrKxyfi enepaix
KaHaJuapbl MeH glreMeuTlepineru.rn4rr
[porpaMManr,(-rexHpr(irJrbr( acepiue 4apcsrrypy, AX a(raparrbr ropray xyftenepin (ayincis
6acrqapy;uu<fp:rrx
(brJrMhrcrapabr 3eprreyxue
aJrabrH arny r<a6i:rerin Kanrrnracrr,rpy.O6paronaremuar [porpaMMa
pernaMeHTr.rpyerueJrr.r,
pe3ynbrarr,r,coAepxauue, ycnoBr.r, H TexuoJroru[
peurusag:z.ll o6pasonarenrxoroflpouecca, oueHKy
KaqecTBauoAforoBxl{ Bbr[ycKHH(a no
aaHHoMy HanpaBneHr.rrc r.r BxJrroqaerr
ce6ruarepualrr,
o6ecueuanarourr4e (aqecrBoloAroroBKu o6y.rarouluxce rr peanu3arluro
cooraercrnyrcrqefio6pasonarelrHofi rexso:roruu. Oco6ennocrrro Ofl ssrqercq
BJrareHr.re6
O EHy 708-02-21 O6pa:oaarerrnar nporpaMMa. H:1auue aropoe
-
"Ensuring the securityof
information infrastructure andIT",
(05.12.2018,No.330);
-
"Developmentof artificial intelligence applications", (05.I2.2018,
No.330);
-
"Business analysts and IT project management" (05.12.2018, No. 330);$oprrrarrurna
anaaparoMs o6racru rpuurorpaQuu It
Kpl,IlroaHanrca;cnoco6nocrr nporuro,qeficrnu, BpeaoHocnoMy
nporpaMMHo- Texur,rqecKoMy sos.qeficrnuro Ha rloAclrcreMbl,ycrpoicrna,
3neMeHThI I,IKauaJrrr uuQoxor*ruynuxaql{oHnr,x cucreM,
6esonacuoeaaMnHncrpr.rpoBanue
crcreM
3ar{r.rrLr uu([opr*raquu I,IC; npe4ynpex4euue u paccneAoBaHriequ$ponrx npecryuexuft
.The educational program regulates the objectives, results,
content,conditions and
technologiesfor the implementation of the
educational process, assessmentof the quality of
graduatestraining in this
areaof
training and includes materials that ensure the quality
oftraining of
students and implementationof
appropriate educational technology. The specialtyof
the EP
is
the possessionof
aformal
apparatusin
thefield of
cryptography and cryptanalysis; theability
to counteract malicious software and technicalimpact on subsystems, devices, elements and channels of
infocommunication systems, secure administration
of information
security systems; prevention and investigation of digital crimes.Ty,rexrirl 6i"rirri.nix cunarrauact r/Kna.nurluraquonHac
xapaKTepucruxanunycxxnxa/
Graduate
Qualifi cationCharacteristics Bepi,rerilr
qepexe:Ilpucyxqaenrar
cretrerrE:Awarded
degree:<6B06306-Axnaparrrr( xayincisAir
xyfierepi>>6iniu
6epy 6ar4apaauacu 6ofi rrnrua a4naparrbr(-KoMMyguKauusr6r( TexgoJromqJrap 6axa.nanprr.Baxaraap s
o6racru
uu$opruaquouuo-roMMyHr,rrarluouurxrexnolorufi
noo6paronarearHofi nporpauue <6806306-Cxcreuu uurloplraquosnofi 6*ouaorocru>
Bachelorof
information and communication technologyin
the educational program <6806306-lnformation Security Systems>MarrannuH
"rraya3brMAapErHun
ririmi llepevenr go.nxnocrefi
cneqllaJrrIcTaList of
specialist's positions-A(naparrury-xoMMyHr.rKarlflr.nlr( xyfie:repiuge a(fiapmrBr
Kopray6ofirnlna
rraaruan;- IluQpirrK rexnororrrlap
6ofirrrrtra Kpr.tMr,rEruucrnxa MaMaHLr;- Kolrnrrcreprix xerirep
rrrenxyfie:rep xayinciaairiu recriaeyuri
xaue TanqaymLr;-
ArqnaparrbrK r(ayinci:air ca-nacErr{aarbr rrHxeHep-nporpaMMr.rcr;- AI(
ayaaropsr;- .{eperrep 6a:acsr, xorr,rnrrorepnix xeninep MeH
uuQparyplr.nrnra,&.{r,rHHcTparopbr.
-Cneuuaaucr iro 3arrure
nuQopr"laqraun
urr[orout'lyulrralu,rouH6D(CI,ICTCMAX;
-
Cneqr.raaucr-xpuMrruaJracr uo qatfponrnr rexxoJron{flM;-
Ana:rurux urecrrpoerqux
6e3onacHocrr.r roMnbprepHrD( cerefi u clrcreu;-
I4nxeuep-uporpamr.racr n o6racruuurfopuaqrounofi
6eronacuocru;-
Ayaurop[IE;
-
A.qrunucrparop 6argaunrx,
roMuBrorepubD(cerei
nuxrlpacrpyrrypsr
-
Information security specialist in infocommunication systems;- Digital
Forensic Specialist;-
Analyst and tester ofcomputer networks and systems security;-
Engineer-programmer in the field of information security;-
IS Auditor;-
Administrator of databases, computer networks and infrastructue.Keci6n
Krr:uer
caJracbrO6.nacrr
uporleccxoua.nrnofi
Kounrrorepaix, TeneKoMMyrr{KaqusJrbrr( xenileparu, 6yrrru rexHoJrorfirnaparrq, ecerrrey xyfie.nepiniq, aepeKrep 6a:acrnrrq, recinopuu ux$parqprurln'lrnrrnt Kayinci:airi; rpunrorparfur;
atqrraparrm(7
O EHy 708-02-21 O6pa:oaare.nrxae nporpauua. I,I:.{auue rropoe
AeqTe"rrbIlocTu
The area of
professionalactivity
xayinci:gix
xyfieaepi.Begonacnocrs KoM[brorepHhx, TeneKoMMyHLIKarI]toHHEx
cerefi,
o6:rarnolxrexHolorufi,
Bbrr{I{cJIr.rreJrbHED(cucreu, 6as
.qaHHbD(,unQpacrpyrrypu
npe.ryrp[rrnfi ; xpurnorparf ux; cuc'reurrun$opuaquonsofi
6esonacuocru.Security
of
computer and telecommunication networks, cloud technologies,computing systems,
databases,enterprise infrastructure;
cryptography;information security systems.
Kaci6n
Kbr3nter o6r,ercriciO6rerr
npoQeccuoHa.rsnoii AecTe,rbHocTIl
The object of
professional
activity
Axnaparrrq
aKrr,rrrep,AI
anQparcgpuurrnarr, xacinopuurHrrq aKnaparrr,(xyfieaepi;
ar<naparrru< r<ayinciaairri KaMTEMacr,r3 ereriH xyfi erep.Llnrfoplraquouurre aKrr,rBrr,
IT-zu<fpacrpyxrypa, uutfoplraquouune cr4creMLr npegnpr.rrrufi; clrcreMbr o6ecne.reHus
au{opruauuouuofi 6e:onacnocru.Information
assets.IT
infrastructure Information Security Systems.Enterprise Information
Systems;Kaci6n
Kr,r3*rerrlyuxqun,rapr.r
xeHeryp.repi
<Dyurqun H
BrA6rnpo$eccuouarr,uofi
AeqTe,'IbHocTuFunctions and types of
professionalactivity
-
Famatuu-rcpmmey )raHe mexHotozt uLttbtti
Kecinopungap uea yfima4apabrll aKnaparrb(
r<ayincis4ix xyfieaepiH TaJr4ay xaHe MoAepHrr3alur_flnay;I]uQprrx rqpbrrrrurap MeH xa6ArnqapAuq
Kpr.rMuHan[crr.rKanrrK caparrrlMacBI;A$raparrr( TexHonomffrap canacbrr{Aarbr 6pylsurncrap
MeH(BrJrMLrCTapALr 3epTTey;
-
I(oadany craue asipteyAxnaparrrq
xyftenepaiurayinci: xqrrrcrm $rruaacrurpy
xeHe onapa,lrsra(naparrbx
r<ayincisaiKri 6acrqapy.Kounuoreplix xyrierep ueu xe
.repAeal(napaTlbl (oprayablr{ flporpaMMaJrbr(-an[apa[6r(,
TexHr,rKaJr6r(,xpunrorpa$ru,rbr(
q?a,rrap6rg eurisy xeue nafigaaany;Kaciuopunaapar,ra aKnaparrbr( xyrlerepinaeri xaHe AT
uaQpargpuurrru.4apllHAarbra(napa'rrbr{ xayincirairriH iruxi
xyftenepin xo6a;ray, eripley,euri:y
xeue (oJraay;- Y
atudacmutpywbutbul JEaHe 6ac 4apytuatnuulKecinoprnraapaa aKnaparrLr (opFay&rH
lfibuAacr6rpylrEr.,lrr(
ruapanapbrH asipaey xaneeruipy;
Aruaparrru<
(ayincbAi(
carJracbrHAarhr$rugacrrrpyrururrry,
xoprumurrix,T;?a$arrAlrpymlr rp(arriMaHbr
a:iprey,euriry
xane xoypri:y.-
Hryu uo - uc c t e d o a ame nu c xan u me xH ol
ozuve c KatAsa';uz s.
MogepHu3aqr,{scucreu uu<fopMaqfiouHofi
6esonacHocru npegnpuxruftu
oprauuta\ui,r;Kpuuuuaaucrr.rvecxaa sxcneprr,r3a qutlporux ycrpoficrn
Lro6opy4orauua;
PaccreAonanqe HapyrtreHuft n npecryn:reuufi s o6racru
unrfopuaquounux rexxoloruft
;-
3xcntyamaquou u aa u pazpa6 om\e c KcaOpranu:aqnx
6esonacHoft gKcnnyararluullurfoplraulronnLrx
cHcreM r,ry[paBneHr.re
3aqlrroft uu$opuaquu n uux.
Bneapenue r.r 3KcrrJryaraurrs flporpzuMHo-anflaparHBx, TexHrrqecKr{x, xpunrorpaQu,recK}tx cpeacrB sarrunmr untlopruaqlllr B KoMrrbrorepHbx crrcreMaxr certx;
flpoerruponaxue,
paepa6orra, Brreapeur.rerr
conpoBoxreurre fioacrrcreM3aqrrT6r ran$opuaquu n
uu<foprraaquounrx cucreMax ra IT-
untf
opacrpyrrypax
upeanpusrufi ;8
O EHy 708-02-21 O6pa:oaarenr,xax nporpaMMa. H:.uauue sropoe
-
Opeauuz a4uo u H o -y np as Jrc H q e c KanPaepa6orxa H
BHeapeHr.re opraHu3auuoHHbrx uuurf oprrrauun Ha rtpeArrpxsrurx;Pa:pa6orxa, BHeapenr.re u
conpoBox(aeHr,renopuarunnofi, pery:rupyoruei
Aor(yMeHTarlufi uur[opuaqnonHofi 6egonacuocru.-
Scientific research and technologicalAnalysis
and modemizationof information
security systemsof
enterprises and organizations;Forensic examination of digital devices and equipment;
Investigation
ofviolations
and crimes in the field of information technology;-
Operational and developmentOrganization
of safe
operationof information
systemsand
information security managementin
them. Implementation and operationof
software, hardware, technical, and cryptographic meansfor
information protection in computer systems and networks;Design, development, implementation and
maintenanceof
information security subsystemsin
information systems and IT-information structuresof
enterpri ses;
-
Organizationol and managerialDevelopment and implementation of organizational
measuresfor
theprotection of information at enterprises;
Development, implementation and maintenance
of
organizational, regulatory documentation in the field of informationMep IIo
3aruuTeand
opraHrr3aur.roHHo-
s
o6,'racrlr9
O EHy 708-02-21 O6palouareruxar nporpauua. H:ranue aropoe
2
erri.nirc/6eiiin xa
acr,r/Ka IIu.rr xounerenulrfi/ Ma / Profile
of Com tencesO(rrry
narrxqnepi (YI( ue,rurepi)/Peryruraru o6y.reHua (egltrriu6r VK)/
The result of training (UC units)
Oqurry Haraxecix KaJr H nracrsr parbr lr
(ryruperririr
ue,rurepi) naHgep arayur/HanMeuosaHrle rrlcunn"run, Qopulrpyrcurlx pe3yJrhrarbl o6yeeHlls (eAlIHrIuu romnereuuril)/
The name of courses that form results of training (uItits of competences)
OHr
- Xexe,
Ma.aeHr ryprbraaHxete reci6n
KapbrM-KarbrHac 6arulrrapuaaarsr uece.nerepri ueuyae ayr,Bua xese xal6aua rypre Ka3a&opbrc xane uere,,r rhaepiHae 6a .nanuc xacay
POr
-
Bcrynaru B r(oMMyHxxauaro aycraoi ,r
rttlcLMeaHofi $opnax xa KanaxcxoM, pyccxoMtt
[HocTpaHHoM ,3trKax&n, peueHut
3aaaqMeron qHocrHoro, MexKynLrypHoro u npoSeccuoxarrxoro o6uesrs
RTr
-
To get into communication in oral and written forms in Kazakh, Russian and foreign languages in order to solve problems of interpersonal, intercultural, and professional interactionsOHr
-
Arnapamapau iraey, caKray! orurey, (opmy xoHe raparyaa uuQpnsrxTexHoJrorrrlbr, eprypri a(naparrhr( xeHe
KoMMyHrrauuf,JrhlKrexHoJrorrrlrapaLr (onaaHy
xeHe ripuri.nirriu aprypli
ca.ra.napuuga recinxeprix 6iriuai rtoraana 6i,ryPOz
-
Hc[o,'rL3oBar6 unQpoBylorexHororrrc,
pa3rrrqubre B]r.qbrxuQopuawrotttto-xoMMyHlrxaufiolrHhlx rexHoror[tr no norlcKy, xpaHeHxro,
o6pa6orxe,
3aqare n
pacnpocrpaHeHlrro ux$opuauant,t
flprrMeHrrh rrpea[pnHr{MarenbcKHe 3HaBH, B pa3Jlr.rnux c$epax xr:re,(errenlHocrl RT:- To
use digital technologies, various typesof
information and communication technologies for search, storage, processing, protection, and disseminationof
information, as well as to apply economic knowledge in various spheres of activityOI(r
-
3amaxayrKOMMyHllXaqXrnbrl( rq?anlap
MeH TeX HOjIO rurrlap,[bt (OJIAaHa 6iny
YKr
-
Cnoco6Hocrrucrrorb3oaaTL coBpeMeHHHe KOMMyHXXaUTOHHbIe CpeACTBa X TEXHOJIO TT }I
UCr
-
Ability to use modemcommunication tools and technologies
0(z -
Bipryrac rruruurxyielix
xorrapacna ueriraenrcH ap rypni xar,(aiirapabr 6ararray xa6i.neri
YK2
Cloco6Hocrb oueHuBarbpa3JrHrr Hr,re cHryauru Ha ocHoBe
UEJIOCTHOI-O CllCTEMHOIO Hayt{Hor-o M r-rpoBo33peHu, UCr
-
Ability to assess varioussituations based on a holistic systemic scientifi c worldview
Otlr
-
QneM.qix Ke3(apacrbr Karbrmacrhrpyaa QurocoQru,rrrx 6iniuai rongana 6i,ry, couuueu 6ipre a3aMarr6rK ycraHLrM (anbrrrracrr,rpyna raprlxu rauyauq uerirri x*erlaepi uea :a4lu.rrrrrapuu raraai 6i,'ryPO:
- flpnuenrrr
$rurocorlcxr,re3r.raHm An,
tlopuupoeanu.r Mr-rpoBo33peHgecr(ofi Ro3llul.u, aHirnfl3rrpoBarb ocHoBHbre3Ta[br
tl3aroHoMepHocru lrcropltqecKoro
pa:arrur
o6ulecreannr
{opr'raponauur rpax.qaHcKofi no3xur{.|RTr
-
To apply philosophical knowledge for the formation of world view, to analyze the main stages and pattems ofthe historical development ofsociety in order to increase civic engagementl.
I(araxcranxuq Ka:ipri :auan rapuxu / Conpeuexnaa rcropurKaraxcraHa / Modem history of Kazakhstan
2.
Pyxaxu xaqrupy / Pyxaxn xaarupy / Rukhani Zhangyru3.
Oxnocor$Nr / Onnoco{ur / Philosophy4.
Oreyuerrir xexe carcu6iliu
tuo4rni / Moayru courtllrt Ho- no,rrrr{qecrnx 3HaHni / Social and Political Knowledge ModuleOItp
-
Oneyuerrix opraaaTYJIFAHbI (AIH IITACTbIPY I(EHC
OHr
-
,{ene ruHHbrKrblpy,ul,rH eaicrepiuen xeue Kypan,[apbrMeH ronbrK(aH.[braleyuerrix xane raci6t xut:mer,i xaurauacurr ery, rayinci:aix ua,aeHreriH
l.
,(exe urunuqrrrpy / <Dx:nvecxaa rymrypa / Physical Training2.
Sxonorx, seri:repi xese ripuririx r<ayincirairi / Ocuogn 9@ EHy 708-02-21 O6pa3oBarenbHa, nporpaMMa. I43AaHxe Bropoe OM6e6ar xyrurperrhir (OIO/
YHnBepcanhHl,te KoMnereHuHH
(vKy
Universal competences (UC)
l.
lUererriri
/ HuocrpaHHufi ,3brx / Foreign language2.
(a:ax (opsrc) ri.ni / Ka:axcxufi (pyccxr.r[) r:urr / Kazakh (Russian) language3.
eHepKacin 6oftHarua urQpaux rexaonorrr / l-lnSpoaue TexHorortlll tlo olpacJrsM np[MeHeHHr / Digital lechnologies by branches of application4.
A(naparrbr( xeue KoMMyHuxawuJlur rexro.nornuap/
HuQopuauuoauo-roMMyHuxaufioHHr,re rexsororun / Information and communication technolory
5.
Kecinxep.nix xaxe 6xrnec / flpeanprHfiMareJrbcrBo a 6n:uec/
Entrepreneurship and business
6.
Icxepnix MereHr.rer/ Kynurypa aenosoro o6ueHur/ Business culture7.
lcrep.lix prlmplrxa /,[e,rouar prrop[xa / Business rhetoricaHErKray Ka6ireri, ciurayarrr,r eMip canrhrH ycraHy
YKtr
-
Cnoco6Hocr6 Sopurpoearr u onpeaerrrrJrr{rrHocTb B couHaJrbHofi cpene fl opHeHTHpoBarbcr Ha 3aopoBbri o6pa3 xfi3Hl.r
UCr
-
Ability to form and definea person in a social environment and focus on a healthy lifestyle
Me(fepy, 3xonorfirnbrK xafaafi.[aH xa6aplap 6ony
PO.r
-
O6ecneqrrb rronHoueHHyro courillrbHyron
npoQeccuouarrHyro ,[err€JrrHocrb Mero,[aMHx
cpeAcrBaMn Qn:uvecxofi KynLrypH, Bra.lerb Kynbrypofi 6eorracHocrn, o6raaarb 3xoJrorlfi ecKrlM co3HaHueMRTr
-
To provide a full-fledged social and professional activities by methodsand means
of
physical culture,to
master safety culture,to
promote anenvilonmental awareness
OHs-
Crr6afilac xeMKopJr6rK KyKhr( 6y3yrxbubrnTap MeH KbuMLrcrapxacayra
xolr
6epMeilriH r+KLrKrbrK caHa MeH KyrtrrKrrrK ruaaexnerrit xerxiniKri aer{refiiHe e 6ony, reciofi MiH,[errepiH opr,rxray xaxe uiuer- KynH( MereHBeri MeH (apbrM-(arHHacrbr4 3TrrKalJrbrK HopMiurapbrH caKTay.POs-
O6raaarr aocraroqHHM ypoBHeM llpaBoco3y.allvtu
flpaBoBofiKynhrypLr, r.rcKrloqarcuuM coBepueHr{e KoppynllxoHHErx [paBoHapylxeHHE r.r
flpecrynneHuii,
ucrorHrrb
npooeccxoHa,rbHHe o6r3aHHocrn, co6rroAarb flpr1HunnH rrynbrypH noBeaeHx, r.r 3TrrqecKue HopMbr 06ueHr.rtRTs-
To have a sufficient levelof
legal awareness and legal culture thatexcludes
the
commissionof
comrption offenses and crimes, perform professional duties, observe behavior culture principles and ethical normsof
communication
3r(oJror[tr fi 6e3onacHocrlt xt 3HeAenrerLHocrfi / Fundamentals of
ecology and life safety
)l(a.lnrr raci6n ry:uperri,r ix/
O6uen po+eccEoHarbH6re xounereHqxN (OIIK)/
General Professional Compete nces (CPC)
OKurry neTrxe,repi (OIIK uo,rurcpi)/
Pcry.rrrarrr o6yscrrra (earurqbr
OIII(y
The result oftraining (GPC units)
Oqsrry uarNxecix KaJrb!flTacrr,rparHH (Ky3r,rperrinix Monruepi) reH.[ep araybr/
HarueroaaHne ancqnn.nru, Qoprrrnpyrculrx pe:ynhrarhr o6yveHue (e.qrHnqrr ronrnereHun[)/
The name of courses that form results of training (units of competences)
)I(KI(r
- 8p
ryprirrapaa[r-MirJrapabr
KoraaHaoTr,rpbrn, 3aMaHayu ri,r4ep4e
nporpaMManay
Ka6ineriHilt 6orryu; xeci6lr KH3Merre Heri3ri xapaTbrnbrcraHyfT,IJIbIMAAPbIHbIH 3ATIAAPH MEH MaTeMaTlrKuurbrK annapaTTapahr
KOnAaHy;
a(flapaTrhl(TexHorornflJrapMeH
xeci6ra AeqrefiAe xyMbrc xacayonlt.-
I]porpaMMrpoBarb coBpeMeHHhrx
Croco6xocru
HA
{3hlKztx c
OHo Keci6u
uacererep,aiueuy
KBiH.(errlcrperri
ruareuaruxa, brr(r[MaflablKrap reopltrcHxare
MareMarrxartt( cratncrlrxaxsrH ruicriMaTeMarrrKaJrH( annapaTbrH llYPbrc (onaaHy laraHrapbrH Merlrepy
POo
- Braaerr
HaBHKaMT KoppeKrHo npnMeHnrb[pH
petueBuufipo(DeccnoHanbHblx 3a.qaq coorBercrayrourr.rft MareMar[.tecxrri alnapar trHcKpeTHofi MaTeMarlKr. Teopl.rfi BeporrHocrefi
t-t
MareMarfl,{ecxofiCTAT}tCTH KII
RTo-
To have the skillsto
cor€ctly apply the appropriate mathematical apparatusof
discrete math€matics, probability theory and mathematical statistics when solving professional problems1.
MareMarrxa/ MareMaTuKa/ Mathematicsl2.,{ucxperri uareuarura,/ [rcxpcrxa-r uareMarxKa./ Discrete Mathematics
3.
Kpumorpa$uruu( MmeMarrkzrJrLr( HerbAepi/ MareMar[qeckr,re ocloBhr xpurrrorpa{rnl Mathematical basics of cryptography4.Kotraau6anu flporpaMMarapatrn naxgrrepinac nporpavuaray/
nporpaMMrpoBanne B nar(erzL\ npfiklalrlaux nporparvu/ Programming in Application Packages
5.
Avnpar xeHe Ko.(my reopxrcr,/ Teoplu ,Hr}opMaum u roaaposatru/lnformation and Coding Theory
6.
bl(Tt{Man,4HK Tepl-.tfl cH xeHe MareMarrKzulhrK cmrucrnxa"/ Teoprr BepoflTHocrHocreu
MareMarlrqecxat crarucrllxal Probability theory and mathematical statisticsOHz
- Misaerrix
(ofiburhrMsrgKoca
arraHAaxorapri
aexrefiriflporpaMManay ri,raepiuiH xare vauruHara T ayerai nporpavMirnay ri,raepiniH Hed3.uepiH xrepy, MeceneJrepai ureuy saicrepix rarr.qa[ 6irry, a.mopurvaep.li
l.
C++ TiniH.[e nporpaMManay/ flporpavuupoaauue Ea ,36rKe C++/Programming in C++
2.
Anropnn'a.aep xaue.(eperrep rqprulrMAapl/ Aaropnruu u crpyKrypuO EHy 708-02-21 O6pa:oearerruar nporpauua. I4:4aaxe Bropoe
10
flclroJllt3 oBaHr-reM pa3JurqHbrx
napaalrrM;
HcnoJrh3oBaHr-t, ocHoBHbrx ecaecTBeHBoHa) rHbrx3axoHoB
Il
MaTeMaTHqecKoro annapaTaB
npo(DeccfioHarLHor.(erTenbHocTl4;
HaflpooeccrroHanhHoM ypoBHe pa6orarb
c
[rHoopMaunoHHbrMu TCXHOIOTH'M}ICPC,
-
The ability to program in modem languages using different paradigms;the use of
basicnatural science laws
andmathematical apparatus
inprofessional activities; work on a
professional level
withinformation technology
rarlJ(ay HeMece KYpy, nporpaMManay ruuEtr€ anropr.rTMAepar xY3ere achrpy, flporpauMaHbr erutey ver recriney xlpri'lyai lrrepy
PO?
-
Bna,u.erb ocHoBaMu flporpaMMrpoBaHlu Ha ,3r,rxix Br,rco(oro ypoBH, r-rHa Ma[II{HI]O-3aBt,lcI-tM6IX
'3bIrax npofpaMM[pOBaHlrr, BKJITO!{Zl' IOCTaBOBKy
3aAaq[, yMeuue
arr6rparr
M€ToAbr perxeHfiq 3aAaqu, co3.[aBarb rn[.tBbt6xparb
arropr-rrMbr, peaJrx3oBbrBarr,it ropnrMbt Ha
r3brKenpofpaMMltpoBaH[.1,, npor]3Boat-tTb oTJralhy r.r TecTupoBaHr.re nporpaMMbl
RTr-
To master the basics of programming in high-level languages and in machine-depend€nt programming languages, including setting a problem, theability to choose methods for solving a problem, create or select algorithms, implement algorithms in a programming language, debug and test a program
aaunro</ Algorithms and Data Structures
Python riniH,le nporpaMMaJray /Ilporpauurpooaare Ha ,36rKe P]thon/
Programming in P),thon
Crpum riraepiuac nporpaMManay /llporparrMxpoBauxe Ha cxpumoBlrx ,3EIK&V Programming in Script Languages
Java-ga
o6Terrire
6arslrra,rran fiporpaMM:rnay/ O6'uerrso- opueErapoBaHHoe rporpaMMUpoBaHue Ha Java./ Object-Oriented Programming on Javallporpauuarur koarH TaJL{ay
xetle
or{rainaHrLrpyl Aaanta3 nom[MD3auH, nporpaMMBoro Ko,[a/ Program Codc Analysis and Optimization
Xyienir
nporpanarua,lay /CxcreMHoe nporpaMMxpoBanue/ Systems Prograrnm ingI
OHo-
I-lut$prurr cyl6anapaut4ap rypni
ronnouerrrepiH anu4ray, curl:rnaap,4br ua$prut< ortaey rrpnH[Hnrepixxere
crruarAapau xi6epy reoprrcuru 6iry xeHe orapabl xaci6n ecemepai ueuyae xon,laHyPOr
-
,(euoncrplrpoBarb 3HaHxr: 06 apxrreKrype Bbr.{r-rcrfiTerbHoii MauruHbr,o
npltH[uflax opraH[3aqxu MHor-olpoqeccopHbrxlr
MHoroMau[HHr,rx BhrqucJraTelbHbtx ct-tcTeM;o
HanpaBneHr-rrx pa3BxTr-rrr KoMnbrcTepoB crpa,[HuxoHHo,l, napannenbHofi
r
Herpa.[rqroHHofi apxureKrypofi; ofipuHuHrrax
noclPoeHfi,
coBpeMeHrirJx KoMnr,roTepHbrxceTefi
u QyuxquoHrpoaarur ocHoBHblxypoBnefi OSI; o6
opraHr.Bauuf onepaqxoHHLrx cr{creMr
o6ecne,{eBl{ltrx
6e3onacHocrn;o
Hacrpofixe rroJrrrnxr-r 6elonacnocrn oflepaurroHulrx cr{cr€M r-t xoMnlrcTepHLrx crcreM rr ceaeFRTr- To
identi$ the various componentsof
digital circuits, know the principles of digital signal processing and the theory ofsignal transmission and apply them in solving professional problemsAxnaparr6rK rcayincir.qirre Kipicne/ BBe.[eHle
I
HHOopMaulroHHyro 6caonacHocrb / Introduction lo Information SecurityKounrroreprix atnaparrLr xopmy rexHollorrrrlapb/ Tcxgoror[! 3aurrLr xoMnEErepHo rBrDopMaruu/ Technologies
of
Computer lnformation ProtectionEy,rrr6r( TexHonorxrnap xerre 3arrap Hnrepueri/ O6ra,rxlre rexHoJrorru
r l,Irrepuer eeqefi/ Cloud Technologies and tntemet ofThings
Ecem€y xyfienepiHiq annapamrrq xa6,[HKra,{ac6r xeue BfipryaJuay TexHonon rrapL/ AnnapaaBoe o6ecneqeuxe ButrucJrrrerrbrl6rx cLcreM, rexHoJrom! ouprya,ruoauru/ Hardware of Computational Systems and Vinualization Technologies
Onepaunerur xylerep xere OX (ayinci3,[iri/ OnepaurroHH6re crcreM6r n 6e3oflacHoq'rb OC/ Operating Systems and OS Security
E
OHo
-
.(epexrep 6a:arapuuurt" oflepaqurnuK xyfienepairl, xounrroreplirxaHe
reJrexoMMyHr.{Karr}rrlrhr(xerilepain, ecemey
xyfienepiHi(Kayinci3,airiH KaMraMacr,r3
ery xeHe
oacrapy aarasurapHH xopcery;a(naparrblK
rayincir.airri
KaMTa {acH3eryni(
nporpaMMilJrHK xane TexHEl(itnbrK r(+pauapbrH KonaaHyPOe
-
,(euoucT papoBarb HaBuKl, arMxHxcrpt-tpoBaHr-rJrlr
o6ecneqeHlu6e:onacxocru 6ag aaHnux, onepaqr,roHubrx cxcreM, KoMnblorepHblx r-t
TeJIeI(oMMyH[KaufloHHErx
cerei,
Bbrrrfi cJrflTeJrbHhlx cacreM; [cnorL3oBarb nporpaMMfibre t,| TexHrrqecxHe cpeacraa o6ecne,reBr-{, rrHoopMauHonHofi 6e:onacnocuRTs- To
demonstrate skillsin
administration and securing databasesAepemep 6a3anap6! xaHe onap,4Hq rqayincirairi/ Ea3H aaBHLx
s
rx6e3onacHocr, Databases and Their Security
3rru
xemipyrui nporpaMMaJrtlK (zuraMarafi (op.arry/ 3auura orBpeaoHocHoro nporpaMMroro o6ecn€geflrrl Protection against Malicious Software
Kounrroreplir xere reJreKoMMyHxKaunrnEr( xyfienep/ KoMnEorepHHe u rereKoMMyHrKaur,roHsrre
cqul
Computer and Telecommunication NetworksKoMn6rcT cpni( xene relexoMMyHr,rKalluarrl xlfiorepaiq rcyincbriri/
6E:onacgocrg rounttorept 6lx r aerexoMMynuxaqfioHBrrx ccrefi/ Security of Computer and Telecommunication Nctworks
O EHy 708-02-21 O6paroeare,rrxar nporpaMMa. l,baarue aropoe
LL
l.
2.
3.
4.
operating systems, computer and telecommunication networks, computing systems; to use soliware and hardware to ensure information s€curity
Kaci6n ry:sr perri,r
ir/
llpooecclIoHan6I|r,re KoMnereHulllI (IIK)/
Professional Competences (PC)
O6ury uaraxe.repi (IIK rue,rurepi)/
Pery.nrraru o6yqeHEq (eauulrusr fl K)/
The result of training (PC units)
Orttry
Harnxecir KarutrrracrHparbrH (ryaurperri.nir ruo.nruepi) naHAep araybr/HaulreroaaHEe trHcuflnnuH, QopMrrpyrounx pe3ynb'r'a'rbl o6yqeEEc (enrrHlluu rounerexuuii)/
The name of courses that form results of training (units of competences)
KI(i
-
Teyexeuepli, axruarepgi,unurAerrrepai,
6a:secri{\Bnitci3nirin 6acrapy,
Kayia-KaTepnepfe (apc6r epexer ery,
Kayinci3.[iKri
recrirey,ocarrHnH Krap uea rayin-xarep
npouecrepiH
KaMTurblHa([aparrbrK
4ayinci:giKri 6acxapyMeH
KaMTacLr3 ery flpouecrepiH xY3ere acbrpy xeHe 6ara,ray aaicrepin ranaay, Ta(trayxene
KorraHy xa6herrepiain6o,.ryu
III(s
-
Cnoco6nocru aHalrx3apoBarb,au6rparu
u[pI]MetIrTl, MeToabI oqeHKIt LI
pqrnx3au
r
npoueccoBo6ecneveHu,
t-l
ynpaBneHx,xH(DopMauuoHHoil
6elonacuocruto, oxBarbrBaroluux
flpoueccbr
ollp€IeneHr|,yr3BuMocTe u
yrpo3,Tecrr-.rpoBaurfl 6conacuocrN, npoT[Boae
cTa[,
yrpo3aM,yflpaBneHHfl pracKaMtl, aKruBaMri, I-THTIXAeHTaMI-t, HenpepbrBHocTbro 6l,tsHeca
PCs
-
Theselect and assessing processes
ability to
analyze,apply methods for
and
implementingfor
ensuring andOHro-
Kovnuroreprix a{naparrlr ropray aaicrepin, x+pan,qapbrH xeHe TexHoJrorrrrJrapbrE (oJlAaHHn, yfibtMHblt( AI( 6aurauacrrr ery 6ofiuHura ic- uapanaprH xocnaprafi6i,ry. Axnaparru(
Kayinci3nix caracHHrarr,rxrr:uemi perreiiris seri:ri
xaJrhrKaparhrK xeHeynrru(
3a{HaMarr6r(, yfir,rM,racrr,rpyrubuhr( xaHe npoueayparHK axrirep,ti xo,raana orlrpun, aKfiaparrbr{xafibulLrr xeryix illlAbrH
zllrarbtHxyie,repin,
AK uourropuxri.ney xyierepiu, ocanrbmbrKrapabr uoHlrroprxrirey xyfie,repiu,AK
(avraMacus ereriH annaparrbrK-nporpaMManbrK Kypa"laapbrH KonaaHy aaFAbrnapHH Me[repyPOro- Vnerr
[puMeHrrb MeroAbr, cpeAcrBar rexHororr[
3aur-rrbrxoMrrbmrepHoi NnQopuaura, ruraurrpoBarb Meponpl,lrrx, no o6ecneqeH[ro HE opraxnuuNx. Braaerb HaBhrxaMr nptlMeHeHH, an[aparHo-rrporpaMMHbrx
cpeqcrn o6ecne,reuar
l4E,
cxcreu MoHrlTop[Hm yr3Bl-tMocrefi, c[creM MonuropuHraI4E s crcrev
[peAorBpaueHnr yrevex ruQopuauut c[cIIoJIb3oBaHBeM
6a:osurx
Mex(AynapoAHr,rxE
HaulroHarbBbtx 3aKOHOAaTeJrbHbrX, OpraHu3aqrroHHr,rx l,l npoqelypHbrx axToB, perynflpyrcur|x aerreJrbnocrb B o6Jracrlr uH$opuaqrouuofi 6e:onacHocrltRTro
To be able to apply methods, means and technologies for protecting computer information, to plan me:lsures to ensure the organization's [S. To possess the skillsof
using hardware and software toolsfor
information security, vulnerability monitoring systems, information security monitoring systems and information leakage prevention systems using basic intemational and national Iegislative, organizational and procedural acts regulating activities in the field of information securityl.
Kounrorepaix axnaparrlr Kopray rexloaorauapr/ Texuoaorflu 3 rlmbr roMnbrcTepHofi unQopuauar-r/ Technologiesof
Computer Information Protection2.
A(naparr6l( myiflci3.ailrTeri xacaluru nurerlreKr aaicrepi/ McroAu r,rcKyccrB€HHoro HHTennerra B uHdopMaluoxsoi 6glonacsosru/ Anificial Intelligence in lnformation Security3.3m8
xerripyrxi nporpaMManbrK KzMTaMa.raH (opmfly/ 3aurrra qrBpeloHoanoro nporpaMMHoro o6ecne,icurrcl Protection against Malicious Software
4.
A(naparr6r r<opray ruxeueplir-rex l-rkrlnBr( rypa.uaps/ I4HxeHepHo- rexHflqeckue cpercrBa 3atqxrbr uuQoprvauuu/ Engineering and Technical Means of lnformation Protcction5.
EacHn kipyai aHHKray xeHe a&l6rHany xyierepy
CrcreMbro6HapyxeHEx tr npeAorBparu€H]tx aropxerufi/ Intrusion Detec(ion 8nd Prevention Systems
6.
AK[aparrbrK rayinci:airrir crauaprraptr ueu uoplaumix-rcgxurrruxfleri3Aepi/ Cranaapru u
HopMar[Buo-npaaoBue ocuoBbl BEoopMaunoHHo 6Bonacxocrrr/ Information Security Standalds and Rogulatory Bases7.
AepeKrepli ra,raay eaicrepi/ MeroIH aHarx3a.qaHHErx/
Data Analysis Methods8.
ArnaparruK myincia.qirriq ayftrru xeHe 6acKapy/ AyIrfl x ynpaB.[gHxe ,HoopMaunoHBotr 6e:onacHocrHo/ lnformation Security Audit andManagement
p.
Kx6epxayinci:airreri xa6apaaprurrrrr aprrurpy/ nosuruerne ocBe,uoMreHHocrr.ra
xr6ep6esonacxocru/Cyber
SecurityAwareness OHrr
-
[lporpanu:rnap MeH a(naparrr,rK xyEelepai xo6aray xaue xayincire3iprey, KoMnLprepnix $inMHcrapIHH :rn.[ErH a"ny
xaHe
3eprrey ,laubrnapblH urepy. fleperrepai xHHay, e(trey xeHe KalnbrHa Kenripy yruiH nporpaMManH(xeHe
rexHHKirJrhrK rqpalr,[ap,qbr KonAaHy. AKnaparrr,r 6a4sr.ray, 4yxarray xoHe (opraylLr x\,Bere acHpyPOI
-
Braaeru HaBbrraMu npoeKrrpoBaHlrru
6e:onacaofl pa3pa6orKxl.
A(naparrrrx xyIerepait nporpauuaauK xomnoxenrrepiniu rayincirairi/E€3onacuoq-r6 flporpaMMnbrx xoMnoHeHToB urQopMaqnorrnbrx c[creM/
Security ofSonware Components of Information Systems
2.
OafiuLrK xyfienep,{i rpxMunaJtlEr( raaaay/ Kpuuuua:rxsrx'{ecxxfi aHarM3 oatrnoBLrx cllcrcM/ File Systems Forensic Analysisl.
fiporpaMManHK KaMT,MaHurH rayinciuiri xeHe 3rrnabt Ko,{TH jeprTeyslicrepT E*onacuocrs rpomaMMHoro o6ecfleqeulr,
t-r
Mero.(6rO EHy 708-02-21 O6pa:oeare,rrnal nporpaMMa. H:Aarue aropoe
72
managing information security,
covering the
processes of identirying wlnerabilities andthreats, security
testing,countering
threats,
managingrisks,
assets, incidents, and business continuitynporpaMM
I
uxQopuauuogur,lx chcreM, HaBbrxaMu npe.lorBpauegu, r.tBeAeHH, paccJreAosaHnfi xoMurrorepHbrx flpeqryuneHt,ltr. HcnonL3oBarb [porpaMMHHe
r
rexH]trlecr(He cpegcraa c6opa, oopaoorxl-t r-t BoccraHaBJresfirr.[anHr,rx.
Ocyuecrarrrr ro]flponb,
AoKyMeHrpoBaure l,t
3auuryrrHoopMaunx
RTrr
-
To possess the skills of designing and safe development of programs and information systems, the skills of preventing and investigating computer crimes. To use software and hardware for data collection, processing and recovery. To control, document and protect informationrrccrc.qoaaHu, BpeaoHocHoro Ko.tal Software Security and Malicious Code Research Methods
Kopl"JraH a(naparrbrK xyrenepAi $ipney xoHe naiLqanaHy/ Pa3pa6or(a
t-r ](cnnyaraur, 3ar{rureHB6rx uutloplaulrourrx cucre
{/
Securelnformation Systems Development and Operation
Ufi$pnHt< kpr{M[HanxcrxKarrlr1 xeris.qepi/ OcrioeH un$poBofi rpauunaaucrard Digital Forensics l-oundatioos
Eac6rn Kipyai recri,reyl Tecrapooaurc Ha npoHH(HoBeHxe/ Penetmtion Testing
Xeriaix xase vo6r:rsai rypslrrutnapr? Kpr.lMlHarulor( caparraua/
Kpunruraaacrarecrae 3r(cneprx3a cereBux
u
Mo6urt HL,tx ycrpoicrB/Forensic Analysis ofNetwo* and Mobile Devices 4
5.
6.
t
AKnapar xcHe kolTay reopxecLr/ TeopH, r.iH(DopMauH,i u ro uponaxrr/
Information and Coding Theory
Kpt-rrrorpaQurnu4 MareMar[r(a.fiLrK Heri3,{epi/ MareMarxqecKHc ocHoBbl t(pxmorpaoru/ Mathematical Basics of Cryptography
Kpfimonorxr/ Kpnmonorsr/ Cryptology
KprnrorpaQrr,rur [poro(ontap/ KpHnrorpaolr'iecKI,le nporoKonEr/
Cryptographic protocols
CTe.aHo.pa+m aaroprm,r,4epi x.re t<+paltaapH-/ Anropr.Msr t-r cpercrBa creranorparlx/ Steganography Algoritims and Means
I
t
OHrr
- Kaci6u
MacerenepAiuetuy
rq3brp€TriJririnxene
6i.nimai HHrerpauxrnay Jla.abuapbrH MeqrepyPOr- Blaaerr
KoMrrereHr1nflMn perueHx, [poQ€ccuoHalbrHx 3a.qaq HHaBHXaMIl HHTerplpOBar rr 3HaHXfi
RTr-
To have the compet€nceto
solve professional tasks and skillsof
knowledge integration
l.
.[nruouar4u nparrara./ flpe,agunrouraa nparrura./ Pre-diploma practice.
Oxaipicrix nparrnra/ flpor:aorcraeuxar npaKrlfl(a/ Industrial practice<D EHy 708-02-21 O6pa:oaare,rluan nporpaMMa. I,l:4aaae aropoe
13
OHrz
AKnaparrap MeH KoATay reoptrrchrur,rt1 Heri3AepiH, rexnror?a$fi,xeHe
f,T)t4rnorarl.uay cirIracr,rHAa$opuals4u
annaparr,rH, neri:ri rpunrorpaQualuK ;rnroplrrM[ep MeH xarraMaJrapbrH Me(repy xaHe onapaLr AepeKrep.Ei (opray MeceneciHAe (onqauyPOrz
- Bra.qsrr
ocHoBaM[Teopxl
t{HQopMaqr{xfl
Konr-rpoBaHlx,tlopua.rrxuu anflaparoM
B o6nacr[
l?nnrorpaQuua
KprjaroanaJu3a,ocHoBHl,lMl.t rpanrorpaQu,recxrMu alrropurMaM[
r
rrporoKoJraMn H[pHMeHrTh ]rx B 3aaaqax 3aruuTr,r aaHHbrx
RTrz