Course: Risk, Cyber Serurity and Financial Technologies Applications

» List of faculties » FAM » MUSKM
Course title Risk, Cyber Serurity and Financial Technologies Applications
Course code MUSKM/2RFT
Organizational form of instruction Lecture
Level of course Bachelor
Year of study not specified
Semester Summer
Number of ECTS credits 6
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Homolka Lubor, Ing. Ph.D.
  • Žáček Petr, Ing. Ph.D.
Course content
1. Crypto-environment (a) Blockchain technology (b) The Merge (c) The collapse of the Terra ecosystem 2. Cybersecurity 1 (a) The role of security in IT (b) The Internet model 3. Cybersecurity 2 (a) Types of attacks 4. Risk management standards (a) Management standards (b) GDPR, virtual identity 5. Investment/trading risk analysis (a) Data sources and APIs (b) Visualisation and indicators (c) Advanced risk indicators

Learning activities and teaching methods
unspecified
learning outcomes
Knowledge
Apply methods and techniques to secure a computer against external attacks.
Apply methods and techniques to secure a computer against external attacks.
Explain the essence of blockchain technology.
Explain the essence of blockchain technology.
Clarify the risks associated with holding cryptocurrencies in crypto wallets
Clarify the risks associated with holding cryptocurrencies in crypto wallets
Assess the costs of holding and operating with cryptocurrencies (gas).
Assess the costs of holding and operating with cryptocurrencies (gas).
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi).
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi).
Skills
Uses both centralised and decentralised financial technologies.
Uses both centralised and decentralised financial technologies.
Uses security measures to protect personal and corporate data.
Uses security measures to protect personal and corporate data.
Assesses the risk level of cryptocurrencies compared to traditional instruments.
Assesses the risk level of cryptocurrencies compared to traditional instruments.
Explain the possibilities and limitations of implementing blockchain technologies in business practice.
Explain the possibilities and limitations of implementing blockchain technologies in business practice.
Utilize appropriate means for holding and managing cryptocurrencies (wallets).
Utilize appropriate means for holding and managing cryptocurrencies (wallets).
Recommended literature
  • ČASTORÁL, Z. Management rizik v současných podmínkách. Vydání I. Praha: Univerzita Jana Amose Komenského, 2017. ISBN 978-80-7452-132-4.
  • KOSTOPOULOS, G.K. Cyberspace and Cybersecurity.. Boca Raton: CRC Press, 2013. ISBN 978-1-4665-0133-1.
  • WITTEN, I. H. Data mining: practical machine learning tools and techniques. Amsterdam, Elsevier, 2017. ISBN 978012804291.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester