|
Lecturer(s)
|
-
Homolka Lubor, Ing. Ph.D.
-
Žáček Petr, Ing. Ph.D.
|
|
Course content
|
1. Crypto-environment (a) Blockchain technology (b) The Merge (c) The collapse of the Terra ecosystem 2. Cybersecurity 1 (a) The role of security in IT (b) The Internet model 3. Cybersecurity 2 (a) Types of attacks 4. Risk management standards (a) Management standards (b) GDPR, virtual identity 5. Investment/trading risk analysis (a) Data sources and APIs (b) Visualisation and indicators (c) Advanced risk indicators
|
|
Learning activities and teaching methods
|
- Term paper
- 30 hours per semester
- Home preparation for classes
- 40 hours per semester
- Preparation for course credit
- 10 hours per semester
- Preparation for examination
- 20 hours per semester
- Participation in classes
- 50 hours per semester
|
| learning outcomes |
|---|
| Knowledge |
|---|
| Apply methods and techniques to secure a computer against external attacks. |
| Apply methods and techniques to secure a computer against external attacks. |
| Explain the essence of blockchain technology. |
| Explain the essence of blockchain technology. |
| Clarify the risks associated with holding cryptocurrencies in crypto wallets |
| Clarify the risks associated with holding cryptocurrencies in crypto wallets |
| Assess the costs of holding and operating with cryptocurrencies (gas). |
| Assess the costs of holding and operating with cryptocurrencies (gas). |
| Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi). |
| Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi). |
| Skills |
|---|
| Uses both centralised and decentralised financial technologies. |
| Uses both centralised and decentralised financial technologies. |
| Uses security measures to protect personal and corporate data. |
| Uses security measures to protect personal and corporate data. |
| Assesses the risk level of cryptocurrencies compared to traditional instruments. |
| Assesses the risk level of cryptocurrencies compared to traditional instruments. |
| Explain the possibilities and limitations of implementing blockchain technologies in business practice. |
| Explain the possibilities and limitations of implementing blockchain technologies in business practice. |
| Utilize appropriate means for holding and managing cryptocurrencies (wallets). |
| Utilize appropriate means for holding and managing cryptocurrencies (wallets). |
|
Recommended literature
|
-
ČASTORÁL, Z. Management rizik v současných podmínkách. Vydání I. Praha: Univerzita Jana Amose Komenského, 2017. ISBN 978-80-7452-132-4.
-
KOSTOPOULOS, G.K. Cyberspace and Cybersecurity.. Boca Raton: CRC Press, 2013. ISBN 978-1-4665-0133-1.
-
WITTEN, I. H. Data mining: practical machine learning tools and techniques. Amsterdam, Elsevier, 2017. ISBN 978012804291.
|