Languages

Master program "Open Information Systems"

  • : Function split() is deprecated in /VHST/oit/master.cmc.msu.ru/modules/filter/filter.module on line 1190.
  • : Function split() is deprecated in /VHST/oit/master.cmc.msu.ru/modules/filter/filter.module on line 1190.




Advanced chapters of operation research



Mathematical methods of IT security

This is an obligatory course for 1-year students, studying for the magisterial degree “Open Information systems” and “Network software”.
The course is hold during the 1st term. There are supposed 36 hours of lectures and 36 hours of practice. Pre-examination on practice and exam in the 1st term.
The course is organized by the Laboratory of Open Information Technologies.
Within the course supposed the study of methods and algorithms, standards and also services of information technology security. A considerable attention is paid to the study of the most important services and mechanisms of information security, cryptographically algorithms and protocols, problems of information defense in the Internet. In particular are considered the main algorithms of symmetric cryptography: DES, 3DES, IDEA, GOST 28147, Blowfish, Rijndael, and the modes of their use. Also are studied the algorithms of public key cryptography, such as RSA, Diffi-Hellman and DSS; are examined the principles of Public Keys Infrastructure, the standard Х.509 (3d version). Are researched the most frequently used applied protocols of net security and protocol of creating virtual private nets.

Practice: usage eToken Aladdin O for Public Key Infrastructure based on Windows Server 2003.

Lecturer O.R. Laponina

The technologies and principles of Internet information protection

This is an obligatory course for 1-year students, studying for the magisterial degree “Program devices of net”. The course is hold during the 2st term.
There are supposed 34 hours of lectures and 34 hours of practice. Pre-examination on practice and exam in the 4st term. The course is organized by the Laboratory of Open Information Technologies.

In the course are studied the most frequently used protocols of net security (both applied and net levels). Also are examined the problems of providing the security while joining the corporate net to the Internet. The main attention is drawn to the classification of firewall, Intrusion Detection Systems and providing security of DNS and Web servers.
The author of the program is Olga R. Laponina

Lecturer O.R. Laponina

Computer Networks.

This is introductory course to computer network technologies. It is also an introduction to basic telecommunications technologies and information security in networks. It covers vary basically ISO OSI RM, TCP/IP protocol stack, Ethernet and WiFi principles, core network technologies, PSTN and GSM, main threats and vulnerabilities, and also popular cryptographic technologies and secure network protocols.

Lecturer D.E. Guriev

Internet Technologies.

This course covers main knowledge, information and skills in Internet technologies for network administrators and network software developers. The course consists of three divisions: 1) basic technologies and protocols, such as TCP/IP stack protocols, addressing and naming, routing, 2) information security issues, such as threats and vulnerabilities, cryptotraphic algorithms and secure protocols, firewalls, 3) WWW core technologies, such as HTTP, HTML, CGI, XML and DOM in details.

Lecturer D.E. Guriev

Database programming

This course covers the following topics: data models, relational databases and SQL, programming API for database access, object-relational mapping systems, distributed databases. Also we discuss the things related to databases deployments in the high load systems: middleware and 3-tier applications, caching systems.

Lecturer D.E. Namiot

Java for Internet applications

This course devoted to one element of JEE specifications – web tier programming and covers the following questions: HTTP protocol and common gateway interface, Java servlets and filters, system events in Java containers, JSP and custom taglibs. Also we discuss the popular web frameworks used in Java development like JSF, Struts.

Lecturer D.E. Namiot

The development of distributed applications

The course considers modern technology development of distributed applications. The course examines the creation of COM components, Web services, the using of NET.Remoting technology, and the creation of EJB components.

Lecturer I.Y. Bajenova

Corporate Databases

Lecture Course introduces students to theoretical and practical aspects of using corporate databases based on Oracle and Microsoft SQL Server. Studied in detail the issues of administration and database management. The course considers PL / SQL and Transact SQL languages.

Lecturer I.Y. Bajenova

The programming language C# and technology .NET

It is a practical course which introduces the basic technologies .NET, based on the use of the programming language C#.
This course examines the use of mechanisms for the reflection, the use of attributes, delegates, callbacks; studies the work with databases with the use of technology ADO.NET, the various technologies of development of the graphic user interface, creating services windows, the use of technology ASP.NET.

Lecturer I.Y. Bajenova

Distributed SQL applications

The course examines the modern technology used to create applications that work with databases. The course introduces the basic features of class libraries for working with databases used in various modern programming systems.

Lecturer I.Y. Bajenova