Materials

How to issue a laboratory report according to state standard

Name of the discipline Groups / Course Materials for classes Main tasks (+ date of submission of the report) Academic performance (by group)
Assembler in information security tasks 2 course 1) Lectures part 1

2) Assembler on MK (Arduino)

1) The initial cycle of laboratory work (until October 28)

2) Laboratory AT&T (until November 04)

3) Laboratory reverse / obfuscation (until December 02)

1) Laboratory Reports

2) Colloquium Results (Week 14)

Computer viruses 4 course 1) Lectures part 1

2) The material for the anti-virus software

3) Lectures part 2 

4) Create a primitive anti-virus/sniffer

1) Research on current HF from Jan. 2019 (to 02 Dec)

2) Sniffer / antivirus SOFTWARE development (until December 02

3) Scientific article on the topics of obfuscation and exp. vulnerabilities (until December 02) – additional

1) Laboratory reports

2) Results of the HF study

3) SOFTWARE development results

4) Results of the colloquiums (11th week, 13th, week, 15th week)

Software and hardware information security systems 3 course 1) Lectures part 1 + special machinery 1) Writing a scientific article on PASZI (until December 02)2) Research of software product on SZI (until November 11)

3) Research  of hardware SZI (until November 25)

1) Results of the colloquiums (11th week, 13th week, 15th week)

2) Research results of the SZI software product

3) The results of the study of hardware SZI

Fundamentals of scientific and experimental research 2 course 1) Example RSCI articles 1

2) Example RSCI articles 2

3) Additional topics for articles

4) Lectures Part 1

1) List of topics for scientific articles

2) Memo for writing a scientific publication

1) Colloquium Results (13th week, 15th week)

2) Writing a scientific material / article (until December 9)

Cryptography 4 course 1) Theory Part 1
Comprehensive information security at the enterprise 4 course 1) Theory reverse Part 1 и Part 2 1) Reverse Research (until December 02) 1) Reverse Report Results
Technical Information Protection 4 course 1) Theory of EDMS and DBMS 1) Research for pentest-assignment (until December 02) 1) Pentest Report Results
 Network Information Technology 1) Lectures Part 1
Information Security and Information Protection
Internet Security Technologies 4 course 1) Pentest Theory

2) Lectures Part 1

1) Colloquium Results (Week 15)