Lecturer(s)
|
-
Gajdošík Jiří, doc. Ing. CSc.
-
Jašek Roman, prof. Mgr. Ph.D., DBA
|
Course content
|
1. Introduction. Modern threats in information systems 2. Security of information systems, security of IS elements. 3. Security in networks, in operating systems. 4. Authentication, authorization and accounting. 5. IDS and IPS systems. Implementation of intrusion prevention. 6. Firewalls and traffic management. 7. Implementation of security technologies in LAN, WAN 8. Implementation of virtual private networks. 9. Implementation of security technologies based on crypto security 10. Security of operation and management of computer networks. 11. Operation and management of applications. 12. Monitoring of network elements and load of computer systems. Network security assessment 13. Implementation of GRE, IP SEC tunneling technology 14. Cloud security
|
Learning activities and teaching methods
|
Lecturing, Monologic (Exposition, lecture, briefing), Exercises on PC
- Participation in classes
- 56 hours per semester
- Participation in classes
- 16 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge from the field of Information and communication technologies |
Basic knowledge from the field of Information and communication technologies |
learning outcomes |
---|
Student has knowledge about security risks depending on working with information; and methods for his elimination. Student manages to understand security structures of companies and knowledge about this structure on high level, which is necessary for active and constructive input to this structure. Student is able to use common security technologies. |
Student has knowledge about security risks depending on working with information; and methods for his elimination. Student manages to understand security structures of companies and knowledge about this structure on high level, which is necessary for active and constructive input to this structure. Student is able to use common security technologies. |
teaching methods |
---|
Lecturing |
Exercises on PC |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Lecturing |
Exercises on PC |
assessment methods |
---|
Qualifying examination |
Qualifying examination |
Oral examination |
Oral examination |
Recommended literature
|
-
Dobda, Luboš. Ochrana dat v informačních systémech. Vyd. 1. Praha : Grada Publishing, 1998. ISBN 80-7169-479-7.
-
Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
-
Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
-
KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
-
Petr Doucek. Řízení bezpečnosti informací: 2. rozšířené vydání o BCM. Praha, 2011. ISBN 9788074310508.
-
Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
-
SOMMERVILLE, Ian. Software engineering. Boston, 2016. ISBN 978-0133943030.
|