Course: Security Technologies for Protection of

» List of faculties » FAI » AUIUI
Course title Security Technologies for Protection of
Course code AUIUI/AE8BT
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 3
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Gajdošík Jiří, doc. Ing. CSc.
  • Jašek Roman, prof. Mgr. Ph.D., DBA
Course content
1. Introduction. Modern threats in information systems 2. Security of information systems, security of IS elements. 3. Security in networks, in operating systems. 4. Authentication, authorization and accounting. 5. IDS and IPS systems. Implementation of intrusion prevention. 6. Firewalls and traffic management. 7. Implementation of security technologies in LAN, WAN 8. Implementation of virtual private networks. 9. Implementation of security technologies based on crypto security 10. Security of operation and management of computer networks. 11. Operation and management of applications. 12. Monitoring of network elements and load of computer systems. Network security assessment 13. Implementation of GRE, IP SEC tunneling technology 14. Cloud security

Learning activities and teaching methods
Lecturing, Monologic (Exposition, lecture, briefing), Exercises on PC
  • Participation in classes - 56 hours per semester
  • Participation in classes - 16 hours per semester
prerequisite
Knowledge
Basic knowledge from the field of Information and communication technologies
Basic knowledge from the field of Information and communication technologies
learning outcomes
Student has knowledge about security risks depending on working with information; and methods for his elimination. Student manages to understand security structures of companies and knowledge about this structure on high level, which is necessary for active and constructive input to this structure. Student is able to use common security technologies.
Student has knowledge about security risks depending on working with information; and methods for his elimination. Student manages to understand security structures of companies and knowledge about this structure on high level, which is necessary for active and constructive input to this structure. Student is able to use common security technologies.
teaching methods
Lecturing
Exercises on PC
Monologic (Exposition, lecture, briefing)
Monologic (Exposition, lecture, briefing)
Lecturing
Exercises on PC
assessment methods
Qualifying examination
Qualifying examination
Oral examination
Oral examination
Recommended literature
  • Dobda, Luboš. Ochrana dat v informačních systémech. Vyd. 1. Praha : Grada Publishing, 1998. ISBN 80-7169-479-7.
  • Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
  • Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
  • KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
  • Petr Doucek. Řízení bezpečnosti informací: 2. rozšířené vydání o BCM. Praha, 2011. ISBN 9788074310508.
  • Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
  • SOMMERVILLE, Ian. Software engineering. Boston, 2016. ISBN 978-0133943030.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester