Course: Selected Chapters on Cyber Security

« Back
Course title Selected Chapters on Cyber Security
Course code KST/DVKKB
Organizational form of instruction no contact
Level of course Doctoral
Year of study 2
Semester Winter and summer
Number of ECTS credits 20
Language of instruction Czech, English
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Brandejský Tomáš, doc. Ing. Dr.
Course content
There will be disscussed typical attacks and their scenarios. There will be solved problematics of security policy of company/institution including behaviour after identified attacks, determination of defence mechanisms adequacy, penetration analysis and forenze analysis. Students will take practical skills with basic tools used for etical hacking or for forenze analysis. Main topics of course: *Secure hazards in information environment, typical forms and aims of attack. Concepts of security, threat, risk, volunderability. Risks in government and public health. Management of information security by ISO/IEC 27001. *Valid legislative in the area of cybersecurity, its expected evolution in near future. *Security policy, adequate measures, human resources management. Security policy of organization, its definition, problems of its implementation in real environmment, related leglegislation. *Penetration and forenze analyzis. Infrastructure analyzis, DOS & DDOS tests, pishing attacks, "Red team" simulated attacks, audits of OS, attack detection, valid legislation. *Geting knowledge of related tools and procedures.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Methods of individual activities, Laboratory work
Learning outcomes
In this course, students will be introduced into problems of informačtion systém security, related legislation, institutional environment especially in ČR, critical infrastructure and network security, typical risks for institutions, companies and individuals.

Prerequisites
unspecified

Assessment methods and criteria
Oral examination, Written examination, Home assignment evaluation

The student completes at least 3 consultations during the semester concerning the theoretical content of the course. The student will pass at least 1 consultations concerning the assigned practical problem. In practical part of study student will implement secure measure, analyze of security policy, or ethic hacking of suitable system. In the case of secure measure implementation student will demostrate its functionality and will explain its implementation, in the case of analysis or ethic hacking student will demonstrate results of his/her analysis and design.
Recommended literature
  • Banks, Jerry. Handbook of simulation : principles, methodology, advances, applications, and practice. New York: John Wiley & Sons, 1998. ISBN 0-471-13403-1.
  • Kizza, Z. Guide to computer network security. Heidelberg: Springer, 2015. ISBN 978-1-4471-6653-5.
  • Li, Q.; Clark. G. Security intelligence. Indianapolis: Jon Wiley, 2015. ISBN 978-1-118-89669-3.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester