Документ взят из кэша поисковой машины. Адрес
оригинального документа
: http://hcs.cmc.msu.ru/?q=node/1620
Дата изменения: Sat Apr 9 22:46:34 2016 Дата индексирования: Sat Apr 9 22:46:34 2016 Кодировка: UTF-8 |
Mathematical methods of IT security
This is an obligatory course for 1-year students, studying for the magisterial degree ?Open Information systems? and ?Network software?.
The course is hold during the 1st term. There are supposed 36 hours of lectures and 36 hours of practice. Pre-examination on practice and exam in the 1st term.
The course is organized by the Laboratory of Open Information Technologies.
Within the course supposed the study of methods and algorithms, standards and also services of information technology security. A considerable attention is paid to the study of the most important services and mechanisms of information security, cryptographically algorithms and protocols, problems of information defense in the Internet. In particular are considered the main algorithms of symmetric cryptography: DES, 3DES, IDEA, GOST 28147, Blowfish, Rijndael, and the modes of their use. Also are studied the algorithms of public key cryptography, such as RSA, Diffi-Hellman and DSS; are examined the principles of Public Keys Infrastructure, the standard Х.509 (3d version). Are researched the most frequently used applied protocols of net security and protocol of creating virtual private nets.
Practice: usage eToken Aladdin O for Public Key Infrastructure based on Windows Server 2003.
Lecturer O.R. Laponina
The technologies and principles of Internet information protection
This is an obligatory course for 1-year students, studying for the magisterial degree ?Program devices of net?. The course is hold during the 2st term.
There are supposed 34 hours of lectures and 34 hours of practice. Pre-examination on practice and exam in the 4st term. The course is organized by the Laboratory of Open Information Technologies.
In the course are studied the most frequently used protocols of net security (both applied and net levels). Also are examined the problems of providing the security while joining the corporate net to the Internet. The main attention is drawn to the classification of firewall, Intrusion Detection Systems and providing security of DNS and Web servers.
The author of the program is Olga R. Laponina
Lecturer O.R. Laponina
Computer Networks.
This is introductory course to computer network technologies. It is also an introduction to basic telecommunications technologies and information security in networks. It covers vary basically ISO OSI RM, TCP/IP protocol stack, Ethernet and WiFi principles, core network technologies, PSTN and GSM, main threats and vulnerabilities, and also popular cryptographic technologies and secure network protocols.
Lecturer D.E. Guriev
Internet Technologies.
This course covers main knowledge, information and skills in Internet technologies for network administrators and network software developers. The course consists of three divisions: 1) basic technologies and protocols, such as TCP/IP stack protocols, addressing and naming, routing, 2) information security issues, such as threats and vulnerabilities, cryptotraphic algorithms and secure protocols, firewalls, 3) WWW core technologies, such as HTTP, HTML, CGI, XML and DOM in details.
Lecturer D.E. Guriev
Database programming
This course covers the following topics: data models, relational databases and SQL, programming API for database access, object-relational mapping systems, distributed databases. Also we discuss the things related to databases deployments in the high load systems: middleware and 3-tier applications, caching systems.
Lecturer D.E. Namiot
Java for Internet applications
This course devoted to one element of JEE specifications ? web tier programming and covers the following questions: HTTP protocol and common gateway interface, Java servlets and filters, system events in Java containers, JSP and custom taglibs. Also we discuss the popular web frameworks used in Java development like JSF, Struts.
Lecturer D.E. Namiot