Title Abbreviated Time Audience Description Teacher
Development of software and hardware information security  DSHIS 36 603/1 In these elective classes students are invited to familiarize themselves with the programming languages Assembler, C++, Java. Students will be able to learn how to create software & nbsp; applications to protect information. It is also proposed to consolidate their programming skills on microcontrollers Arduino & Raspberry, creating test samples of software and hardware information security. 


  1. Theory
    1. Assembler
    2. Reverse (theory)
    3. C#
    4. Hardware and software (theory)
    5. Introduction to Raspberry
  2. Practice
    1. Assembler (learning commands)
    2. C++ Resources (Online compiler, online tasks)
    3. Example creating applications in C# №1
    4. Example create malware
    5. Example blockchain in C++
    6. Stego C#
    7. Crypto in C#
    8. Project design rules
Shterenberg S.I.
Cisco Network Device Interoperability Basics  CNDIB 36 600/1, 603/1 During the elective, students are invited to familiarize themselves with the functioning of network devices based on the equipment of Cisco Systems – the world leader in the development of equipment for computer networks.   during the training, aspects of working with the Cisco IOS operating system will be considered, the laboratory work will address the configuration of network security devices, basic settings of switches, routers Cisco. Configuration of protocols STP, Etherchannel, protocols of dynamic routing RIP, OSPF will be considered.   as a result of training, students of the elective will have an idea about the principles of functioning of modern computer networks, their configuration, Troubleshooting in data networks, the principles of their protection.  Ushakov I.A.
Development of a virtual stand for the organization’s network and implementation of the results on real equipment  RVE 36  613/1 Project-oriented elective.  This option will be useful for those who feel sufficient potential for the development and implementation of the optimal design of the corporate network using modern network protocols, including IPv6, IPSEC, technology for building virtual private tunnels DMVPN, GETVPN.  during the PEF, students are encouraged to organize a team to perform a network simulation task in a virtual EVE environment and implement the resulting configuration results on real hardware. As devices it is supposed to use the powerful laboratory base which is available at Department of ZSS in AUD. 613, which includes equipment from Cisco Systems, Alcatel. Ushakov I.A.