Документ взят из кэша поисковой машины. Адрес
оригинального документа
: http://master.cmc.msu.ru/?q=en/node/1597
Дата изменения: Sun Apr 10 03:47:29 2016 Дата индексирования: Sun Apr 10 03:47:29 2016 Кодировка: UTF-8 |
Professor V.B. Alekseev, professor E.A. Primenko
The educational programme aims to prepare the graduates for activities requiring in-depth fundamental and professional knowledge, including research in applied mathematics and computer technology, development and use of mathematical models for processes and objects, development and application of advanced mathematical methods and software to address problems in science, technology, economics and management.The objective of the Mathematics and Programming for Data Security Master?s programme is to prepare professionals in mathematics and software for information security in computer systems. The course includes theoretical foundations of computer security, mathematical foundations of cryptography, cryptographic protocols, information security software and hardware, and e-banking systems.
the 1st | term | the 2nd | term | the 3rd | term | the 4th | term | |
Subject | h/w | h/w | h/w | h/w | ||||
Continious mathematical models | 2 | exam | ||||||
Discrete and probability models | 2 | exam | ||||||
Optimization and numerical methods | 2 | exam | ||||||
Object oriented programming languages and systems | 2 | exam | ||||||
Modern operating systems | 2 | exam | ||||||
Network technologies | 2 | exam | ||||||
Methodology and history of applied mathematics and informatics | 2 | test | ||||||
Foreign language | 4 | test | 4 | exam | ||||
Modern philosophy and science methodology | 2 | test | 2 | exam | ||||
Introduction to Cryptography | 2 | exam | ||||||
Mathematical Theory of Information | 2 | exam | ||||||
Mathematical Bases of Cryptology | 2 | exam | ||||||
Theoretical Bases of Computer Security | 2 | test | ||||||
Coding Theory | 2 | exam | ||||||
The Protection of Information Processes in Computer Systems | 2 | exam | ||||||
Cryptographic Protocols | 2 | exam | ||||||
Software and Hardware Facilities of Information Security | 2 | test | ||||||
Boolean functions in coding theory and cryptology. Part I | 2 | test | ||||||
Cryptographic Hash Functions | 2 | test | ||||||
Selective course | 2 | exam | 2 | exam | 2 | exam | ||
Special seminar | 2 | test | 2 | test | 2 | test | 2 | test |
Term paper | grade | |||||||
hours | ||||||||
tests | ||||||||
exams | ||||||||
master thesis | grade | |||||||
state exam | grade |