Course: Cybernetic Security

« Back
Course title Cybernetic Security
Course code USII/FKYB
Organizational form of instruction Lecture + Tutorial
Level of course Master
Year of study 1
Semester Winter
Number of ECTS credits 5
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Čapek Jan, prof. Ing. CSc.
  • Horák Oldřich, RNDr. Ing. Ph.D.
Course content
unspecified

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming)
  • Preparation of a presentation (report) - 18 hours per semester
  • Contact teaching - 52 hours per semester
  • Preparation for a credit (assessment) - 10 hours per semester
  • Individual project - 30 hours per semester
  • Preparation for an exam - 20 hours per semester
  • Home preparation for classes - 20 hours per semester
Learning outcomes
Learning outcomes of the course unit The aim of the course is to acquire theoretical knowledge of cyber security as defined in the Czech legislation in the Cyber Security Act No. 181/2014 Coll. And in the relevant implementing decrees or current trends in this field.
A student who has successfully completed the course can: define basic concepts and know their use; to characterize the cyber security technology platform of information systems; explain what is cyber security and the role of the state. explain the security risks of information systems; explain the difference between PKI and KSI. A student who has successfully completed the course know: To be familiar with basic cyber security services (CERT, CSIRT, NCKB); make appropriate use of cyber security tools; be familiar with the issue of secure document preservation; to carry out an indicative risk analysis. The student who has successfully completed the course is able to: summarize clearly the views of other team members; to communicate in a clear and convincing way to professionals and lay people information about the nature of professional issues and their own opinion on their solution
Prerequisites
unspecified

Assessment methods and criteria
Oral examination, Written examination

Recommended literature
  • Dykstra, J. Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems. Ó Reilly, 2016. ISBN 1491920947.
  • KOLOUCH,J., BAŠTA, P. CyberSecurity. CZ.NIC, 2019. ISBN 978-80-88168-31-7.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester