Course: Security Engineering

» List of faculties » FAI » AUBI
Course title Security Engineering
Course code AUBI/AK3BI
Organizational form of instruction Lecture
Level of course Bachelor
Year of study not specified
Semester Winter
Number of ECTS credits 4
Language of instruction Czech, English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Kotková Dora, Ing. PhD.
  • Hromada Martin, prof. Ing. Ph.D.
  • Kotek Lukáš, Ing.
  • Ljubymenko Krystyna, Ing. Bc.
Course content
1. Introduction to the study of the subject 2. Security environment, current risks and threats, tasks of state administration and self-government bodies, state defense and national crisis response system 3. Terrorism - concept, division, development 4. Specific objects and objects of civil protection 5. Soft goals - concept, division, security options 6. Modern trends in the protection of soft targets 7. Detection of suspicious behavior 8. Use of detection of suspicious behavior in the commercial security industry 9. Management - concept, development 10. Management - organizational structures, managerial functions 11. Security management 12. Facility management 13. The position of IRS units and their financial security, health care system and its position for the analysis of territorial risks 14. HOPKS - emergency economy, economic mobilization, state material reserves, infrastructure construction and regulatory measures

Learning activities and teaching methods
Lecturing, Dialogic (Discussion, conversation, brainstorming)
  • Term paper - 30 hours per semester
  • Preparation for course credit - 33 hours per semester
  • Preparation for examination - 30 hours per semester
  • Participation in classes - 15 hours per semester
prerequisite
Knowledge
Successful completion of the subjects of systematization of security and physical security
Successful completion of the subjects of systematization of security and physical security
learning outcomes
Define the terms "terrorism" and "soft targets", describe their division and characterize their specifics
Define the terms "terrorism" and "soft targets", describe their division and characterize their specifics
Define the "suspicious behavior detection" method and describe its principle
Define the "suspicious behavior detection" method and describe its principle
Characterize the management of the company, its basic structure and the basic functions of the manager's role
Characterize the management of the company, its basic structure and the basic functions of the manager's role
Describe the historical development of management
Describe the historical development of management
Describe the role of security, crisis and facility management
Describe the role of security, crisis and facility management
Skills
Perform a basic analysis of the selected soft target from a security point of view and describe the potential threat of an attack
Perform a basic analysis of the selected soft target from a security point of view and describe the potential threat of an attack
Develop a proposal to secure a soft target against a potential attack
Develop a proposal to secure a soft target against a potential attack
Analyze the advantages and disadvantages of the selected management structure and choose a suitable structure
Analyze the advantages and disadvantages of the selected management structure and choose a suitable structure
Establish a suitable profile of the manager and define his role, role in the company and functions
Establish a suitable profile of the manager and define his role, role in the company and functions
Present an analysis of a potential method of attack on a selected target and a countermeasure proposal in front of the audience
Present an analysis of a potential method of attack on a selected target and a countermeasure proposal in front of the audience
teaching methods
Knowledge
Lecturing
Dialogic (Discussion, conversation, brainstorming)
Dialogic (Discussion, conversation, brainstorming)
Lecturing
assessment methods
Written examination
Written examination
Grade (Using a grade system)
Grade (Using a grade system)
Oral examination
Oral examination
Recommended literature
  • Koncepce ochrany měkkých cílů pro roky 2017-2020. Ministerstvo vnitra České republiky [online. Praha, 2017.
  • KAMENÍK, J. a F. BRABEC. Komerční bezpečnost: soukromá bezpečnostní činnost detektivních kanceláří a bezpečnostních agentur. Praha, 2007. ISBN 978-80-7357-309-6.
  • LAUCKÝ, V. Řízení technologických procesů v průmyslu komerční bezpečnosti, Zlín: Univerzita Tomáše Bati ve Zlíně. Zlín, 2005. ISBN 80-7318-329-3.
  • LAUCKÝ, V. Technologie komerční bezpečnosti II, Zlín: Univerzita Tomáše Bati ve Zlíně. Zlín, 2007. ISBN 978-80-7318-631-9.
  • LUKÁŠ, L. a kol. Bezpečnostní technologie, systémy a management. 1. ? 5. díl. Zlín, 2015.
  • ŠENOVSKÝ, PAVEL. Bezpečnost informačních systémů [online]. 2. vydání Ostrava: VŠB-TU Ostrava. Ostrava, 2018.
  • ŠENOVSKÝ, PAVEL. Bezpečnostní informatika 3 [online]. 3. vydání, VŠB - Technická univerzita Ostrava. Ostrava, 2018.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester