Course: Risk, Cyber Security and Financial Technologies Applications

» List of faculties » FAM » MUSKM
Course title Risk, Cyber Security and Financial Technologies Applications
Course code MUSKM/1RFTE
Organizational form of instruction Lecture + Seminary
Level of course Bachelor
Year of study not specified
Semester Summer
Number of ECTS credits 6
Language of instruction English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Žáček Petr, Ing. Ph.D.
  • Homolka Lubor, Ing. Ph.D.
  • Hrubošová Eva, Ing.
  • Lapčík Radomír, Ing.
  • Staszkiewicz Maria, Mgr.
Course content
"Introduction to the study of risk "Modern risk management tools using machine learning and data mining approaches "Scenario analysis. Description of uncertainty by probabilistic models. Introduction to Monte Carlo simulations "Financial risk management tools, in particular exchange rate risk " Electronic signature "Hash functions, their principles and uses "Information and Cyber Security Management System "Application of financial technologies - case studies

Learning activities and teaching methods
unspecified
learning outcomes
Knowledge
Apply methods and techniques to secure a computer against external attacks.
Apply methods and techniques to secure a computer against external attacks.
Explain the essence of blockchain technology.
Explain the essence of blockchain technology.
Clarify the risks associated with holding cryptocurrencies in crypto wallets
Clarify the risks associated with holding cryptocurrencies in crypto wallets
Assess the costs of holding and operating with cryptocurrencies (gas).
Assess the costs of holding and operating with cryptocurrencies (gas).
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi).
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi).
Skills
Uses both centralised and decentralised financial technologies.
Uses both centralised and decentralised financial technologies.
Uses security measures to protect personal and corporate data.
Uses security measures to protect personal and corporate data.
Assesses the risk level of cryptocurrencies compared to traditional instruments.
Assesses the risk level of cryptocurrencies compared to traditional instruments.
Explain the possibilities and limitations of implementing blockchain technologies in business practice.
Explain the possibilities and limitations of implementing blockchain technologies in business practice.
Utilize appropriate means for holding and managing cryptocurrencies (wallets).
Utilize appropriate means for holding and managing cryptocurrencies (wallets).
Recommended literature
  • KOSTOPOULOS, G.K. Cyberspace and Cybersecurity.. Boca Raton: CRC Press, 2013. ISBN 978-1-4665-0133-1.
  • WITTEN, I. H. Data mining: practical machine learning tools and techniques. Amsterdam: Elsevier, 2017. ISBN 9780128042915.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester