Документ взят из кэша поисковой машины. Адрес
оригинального документа
: http://master.cmc.msu.ru/?q=node/1619
Дата изменения: Sun Apr 10 02:25:54 2016 Дата индексирования: Sun Apr 10 02:25:54 2016 Кодировка: UTF-8 |
Mathematical methods of IT security
This is an obligatory course for 1-year students, studying for the magisterial degree ?Open Information systems? and ?Network software?.
The course is hold during the 1st term. There are supposed 36 hours of lectures and 36 hours of practice. Pre-examination on practice and exam in the 1st term.
The course is organized by the Laboratory of Open Information Technologies.
Within the course supposed the study of methods and algorithms, standards and also services of information technology security. A considerable attention is paid to the study of the most important services and mechanisms of information security, cryptographically algorithms and protocols, problems of information defense in the Internet. In particular are considered the main algorithms of symmetric cryptography: DES, 3DES, IDEA, GOST 28147, Blowfish, Rijndael, and the modes of their use. Also are studied the algorithms of public key cryptography, such as RSA, Diffi-Hellman and DSS; are examined the principles of Public Keys Infrastructure, the standard Х.509 (3d version). Are researched the most frequently used applied protocols of net security and protocol of creating virtual private nets.
Practice: usage eToken Aladdin O for Public Key Infrastructure based on Windows Server 2003.
Lecturer O.R. Laponina
The technologies and principles of Internet information protection
This is an obligatory course for 1-year students, studying for the magisterial degree ?Program devices of net?. The course is hold during the 2st term.
There are supposed 34 hours of lectures and 34 hours of practice. Pre-examination on practice and exam in the 4st term. The course is organized by the Laboratory of Open Information Technologies.
In the course are studied the most frequently used protocols of net security (both applied and net levels). Also are examined the problems of providing the security while joining the corporate net to the Internet. The main attention is drawn to the classification of firewall, Intrusion Detection Systems and providing security of DNS and Web servers.
The author of the program is Olga R. Laponina
Lecturer O.R. Laponina
Computer Networks.
This is introductory course to computer network technologies. It is also an introduction to basic telecommunications technologies and information security in networks. It covers vary basically ISO OSI RM, TCP/IP protocol stack, Ethernet and WiFi principles, core network technologies, PSTN and GSM, main threats and vulnerabilities, and also popular cryptographic technologies and secure network protocols.
Lecturer D.E. Guriev
Internet Technologies.
This course covers main knowledge, information and skills in Internet technologies for network administrators and network software developers. The course consists of three divisions: 1) basic technologies and protocols, such as TCP/IP stack protocols, addressing and naming, routing, 2) information security issues, such as threats and vulnerabilities, cryptotraphic algorithms and secure protocols, firewalls, 3) WWW core technologies, such as HTTP, HTML, CGI, XML and DOM in details.
Lecturer D.E. Guriev
Database programming
This course covers the following topics: data models, relational databases and SQL, programming API for database access, object-relational mapping systems, distributed databases. Also we discuss the things related to databases deployments in the high load systems: middleware and 3-tier applications, caching systems.
Lecturer D.E. Namiot
Java for Internet applications
This course devoted to one element of JEE specifications ? web tier programming and covers the following questions: HTTP protocol and common gateway interface, Java servlets and filters, system events in Java containers, JSP and custom taglibs. Also we discuss the popular web frameworks used in Java development like JSF, Struts.
Lecturer D.E. Namiot
The development of distributed applications
The course considers modern technology development of distributed applications. The course examines the creation of COM components, Web services, the using of NET.Remoting technology, and the creation of EJB components.
Lecturer I.Y. Bajenova
Corporate Databases
Lecture Course introduces students to theoretical and practical aspects of using corporate databases based on Oracle and Microsoft SQL Server. Studied in detail the issues of administration and database management. The course considers PL / SQL and Transact SQL languages.
Lecturer I.Y. Bajenova
The programming language C# and technology .NET
It is a practical course which introduces the basic technologies .NET, based on the use of the programming language C#.
This course examines the use of mechanisms for the reflection, the use of attributes, delegates, callbacks; studies the work with databases with the use of technology ADO.NET, the various technologies of development of the graphic user interface, creating services windows, the use of technology ASP.NET.
Lecturer I.Y. Bajenova
Distributed SQL applications
The course examines the modern technology used to create applications that work with databases. The course introduces the basic features of class libraries for working with databases used in various modern programming systems.
Lecturer I.Y. Bajenova