Course: Science of Cyber Security

» List of faculties » FAI » AUIUI
Course title Science of Cyber Security
Course code AUIUI/ADKYB
Organizational form of instruction Lecture
Level of course Doctoral
Year of study not specified
Semester Winter and summer
Number of ECTS credits 10
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Hromada Martin, doc. Ing. Ph.D.
  • Jašek Roman, prof. Mgr. Ph.D., DBA
  • Šenkeřík Roman, prof. Ing. Ph.D.
Course content
Cyber security as an art and a science. Cyber security legislation. Cyber security standards. National Center for Cyber Security, its importance and function of the Center for Immediate Response to Computer Incidents. Intrusion detection and incident response. Forensic analysis of malicious software. Cybercrime and its manifestations.

Learning activities and teaching methods
Lecturing, Dialogic (Discussion, conversation, brainstorming), Dealing with situational issues - learning in situations
  • Term paper - 80 hours per semester
  • Preparation for examination - 80 hours per semester
prerequisite
Knowledge
The student has knowledge at the level of a master's degree in technical fields.
The student has knowledge at the level of a master's degree in technical fields.
learning outcomes
1. Fundamentals of cyber security: The student can list and describe the basic concepts of cyber security, including its importance as both an art and a science. 2. Legislation and Standards in Cyber Security: The student understands legislation and standards in cyber security and their importance for information protection. 3. Role and function of the National Center for Cyber Security: The student has knowledge of the role and function of the National Centers for Cyber Security and Centers for Immediate Response to Computer Incidents. 4. Intrusion detection and incident response: The student understands methods of intrusion detection and effective responses to security incidents. 5. Forensic analysis and cybercrime: The student has an overview of the forensic analysis of malicious software and the manifestations of cybercrime.
1. Fundamentals of cyber security: The student can list and describe the basic concepts of cyber security, including its importance as both an art and a science. 2. Legislation and Standards in Cyber Security: The student understands legislation and standards in cyber security and their importance for information protection. 3. Role and function of the National Center for Cyber Security: The student has knowledge of the role and function of the National Centers for Cyber Security and Centers for Immediate Response to Computer Incidents. 4. Intrusion detection and incident response: The student understands methods of intrusion detection and effective responses to security incidents. 5. Forensic analysis and cybercrime: The student has an overview of the forensic analysis of malicious software and the manifestations of cybercrime.
Skills
1. Designing and implementing security strategies: The student can design and implement security strategies and policies to protect against cyber threats. 2. Application of legislation and standards in practice: The student can apply legislative and standard requirements in practical cyber security scenarios. 3. Management of responses to security incidents: The student has the ability to effectively manage and coordinate responses to security incidents. 4. Performing forensic analysis: The student can perform forensic analysis in case of security incidents and malicious software. 5. Identification and investigation of cybercrime: The student is able to identify and investigate manifestations of cybercrime.
1. Designing and implementing security strategies: The student can design and implement security strategies and policies to protect against cyber threats. 2. Application of legislation and standards in practice: The student can apply legislative and standard requirements in practical cyber security scenarios. 3. Management of responses to security incidents: The student has the ability to effectively manage and coordinate responses to security incidents. 4. Performing forensic analysis: The student can perform forensic analysis in case of security incidents and malicious software. 5. Identification and investigation of cybercrime: The student is able to identify and investigate manifestations of cybercrime.
teaching methods
Knowledge
Dealing with situational issues - learning in situations
Lecturing
Lecturing
Dialogic (Discussion, conversation, brainstorming)
Dialogic (Discussion, conversation, brainstorming)
Dealing with situational issues - learning in situations
assessment methods
Qualifying examination
Qualifying examination
Analysis of another type of paper written by the student (Casuistry, diary, plan ...)
Analysis of another type of paper written by the student (Casuistry, diary, plan ...)
Analysis of a presentation given by the student
Conversation
Analysis of creative works (Music, visual arts, literature)
Analysis of creative works (Music, visual arts, literature)
Analysis of works made by the student (Technical products)
Analysis of works made by the student (Technical products)
Conversation
Analysis of a presentation given by the student
Recommended literature
  • DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
  • Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
  • Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
  • OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie průvodce světem šifrování. Praha: IFP Publishing s.r.o., 2017. ISBN 978-80-87383-67-4.
  • Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
  • Radley Alan. Science of Cyber Security. New York, 2018.
  • SINGER, P. Cybersecurity and cyberwar: what everyone needs to know.. Oxford: Oxford University Press,, 2014. ISBN 978-0-19-991811-9.
  • STALLINGS, William a Lawrie BROWN. Computer security: principles and practice. Boston: Pearson, 2015. ISBN 978-0133773927.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester