Lecturer(s)
|
|
Course content
|
1. Introduction to the study of the subject (current state, basic concepts, what is the theory of security) 2. History of security 3. Sources of theory of safety and security 4. Postulates of theory of safety nad security 5. Security breach 6. Security environment 7. Chaos theory, evolution, security 8. Security situation 9. Security threats 10. Security models 11. Resilience and vulnerability 12. Kinds of security 13. Security policy, security strategy, security system 14. Integrated rescue system
|
Learning activities and teaching methods
|
Monologic (Exposition, lecture, briefing), Dialogic (Discussion, conversation, brainstorming), Practice exercises, Dealing with situational issues - learning in situations
|
prerequisite |
---|
Knowledge |
---|
The student knows the basic terms and concepts of security, knows the role of security in society and masters the theory of risks. |
The student knows the basic terms and concepts of security, knows the role of security in society and masters the theory of risks. |
learning outcomes |
---|
Enumerate and describe the basic postulates of security and safety |
Enumerate and describe the basic postulates of security and safety |
Clarify the security breach |
Clarify the security breach |
Assess the security situation |
Assess the security situation |
Defines the security environment |
Defines the security environment |
Distinguish the objective and subjective cause of the crisis |
Distinguish the objective and subjective cause of the crisis |
Differentiate individual agents within the security environment and classify them into appropriate groups |
Differentiate individual agents within the security environment and classify them into appropriate groups |
Skills |
---|
Assess the security situation |
Assess the security situation |
Evaluate the security environment of the protected interest |
Evaluate the security environment of the protected interest |
Review the security situation and prediction of possible future developments |
Review the security situation and prediction of possible future developments |
Recognize relevant threats to the given security environment of the protected interest |
Recognize relevant threats to the given security environment of the protected interest |
Determines the security violation according to the topology |
Determines the security violation according to the topology |
teaching methods |
---|
Knowledge |
---|
Practice exercises |
Dialogic (Discussion, conversation, brainstorming) |
Dealing with situational issues - learning in situations |
Monologic (Exposition, lecture, briefing) |
Dealing with situational issues - learning in situations |
Practice exercises |
Dialogic (Discussion, conversation, brainstorming) |
Monologic (Exposition, lecture, briefing) |
assessment methods |
---|
Written examination |
Oral examination |
Written examination |
Oral examination |
Recommended literature
|
-
HOFREITER, L. a Z. ZVAKOVÁ. Teória bezpečnosti.. Krakov, 2019. ISBN 978-83-61645-35-1.
-
HOFREITER, Ladislav. Manažment ochrany objektov.. Žilina, 2016. ISBN 978-80-554-1164-4.
-
LUKÁŠ, Luděk. Teorie bezpečnosti I.. Zlín, 2017. ISBN 978-80-87500-89-7.
-
SAK, Petr. Úvod do teorie bezpečnosti: nekonvenční pohledy na minulost, přítomnost a budoucnost lidstva.. Praha, 2018. ISBN 978-80-7229-652-1.
|