Lecturer(s)
|
-
Zeman Tomáš, doc. Mgr. Ph.D. et Ph.D.
|
Course content
|
The exam takes place in the form of an oral discussion on topics from the above areas processed in the form of thematic areas that are available to students. The topics are updated annually and approved by the Council of Study Programs. Verbal exam from the thematic areas of the given study program: - Processes of Risk Assessment and Treatment - Population Protection and IRS - Objects and People Security and Protection - Cybernetic Security
|
Learning activities and teaching methods
|
- Home preparation for classes
- 100 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Demonstration of knowledge in sub-disciplines within the scope of study plans of the bachelor's study program Risk Management. |
Demonstration of knowledge in sub-disciplines within the scope of study plans of the bachelor's study program Risk Management. |
Skills |
---|
Demonstration of skills in sub-disciplines within the scope of study plans of the bachelor's study program Risk Management. |
Demonstration of skills in sub-disciplines within the scope of study plans of the bachelor's study program Risk Management. |
learning outcomes |
---|
Knowledge |
---|
define the basic and other components of the integrated rescue system |
define the basic and other components of the integrated rescue system |
describe the basic organizational structure of the individual basic and other components of the integrated rescue system |
describe the basic organizational structure of the individual basic and other components of the integrated rescue system |
define warning, evacuation, sheltering and emergency survival of the population |
define warning, evacuation, sheltering and emergency survival of the population |
define the term risk |
define the term risk |
explain the general scheme of risk management |
explain the general scheme of risk management |
explain the principle of risk acceptability assessment |
explain the principle of risk acceptability assessment |
describe basic approaches to risk management |
describe basic approaches to risk management |
characterize the content and context of the Czech Cyber Security Act |
characterize the content and context of the Czech Cyber Security Act |
define basic terms in the field of cyber security |
define basic terms in the field of cyber security |
specify examples of historical cyber security incidents |
specify examples of historical cyber security incidents |
clarify the content and meaning of the protection of persons and property |
clarify the content and meaning of the protection of persons and property |
characterize the basic legal norms and conceptual documents in the field of protection of persons and property |
characterize the basic legal norms and conceptual documents in the field of protection of persons and property |
clarify the places and tasks of basic and other institutions dealing with the protection of persons and property within the Czech Republic |
clarify the places and tasks of basic and other institutions dealing with the protection of persons and property within the Czech Republic |
Skills |
---|
propose the correct procedure for deploying the forces and means of other components of the integrated rescue system when dealing with an emergency or crisis situation |
propose the correct procedure for deploying the forces and means of other components of the integrated rescue system when dealing with an emergency or crisis situation |
choose an appropriate way of implementing warning, evacuation, sheltering and emergency survival of the population during extraordinary events or crisis situations |
choose an appropriate way of implementing warning, evacuation, sheltering and emergency survival of the population during extraordinary events or crisis situations |
determine the degree of danger of the territory of the municipality and the overall coverage of the territory of the region by fire protection units in accordance with applicable regulations |
determine the degree of danger of the territory of the municipality and the overall coverage of the territory of the region by fire protection units in accordance with applicable regulations |
select an appropriate basic risk analysis method |
select an appropriate basic risk analysis method |
propose suitable measures to reduce the risk |
propose suitable measures to reduce the risk |
apply multi-criteria decision-making methods in the evaluation of risk acceptability and the selection of risk reduction measures |
apply multi-criteria decision-making methods in the evaluation of risk acceptability and the selection of risk reduction measures |
evaluate the acceptability of risks and selects an appropriate measure to reduce the risk using a cost benefit analysis |
evaluate the acceptability of risks and selects an appropriate measure to reduce the risk using a cost benefit analysis |
identify the theoretical aspects in a real cyber security incident |
identify the theoretical aspects in a real cyber security incident |
assess the entity's obligations under the Czech Cyber Security Act |
assess the entity's obligations under the Czech Cyber Security Act |
identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
propose procedures to increase the cyber security of the subject |
propose procedures to increase the cyber security of the subject |
propose a method of securing object and shell protection of a protected object |
propose a method of securing object and shell protection of a protected object |
propose the organization of regime protection in the facility |
propose the organization of regime protection in the facility |
teaching methods |
---|
Knowledge |
---|
Dialogic (Discussion, conversation, brainstorming) |
Dialogic (Discussion, conversation, brainstorming) |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Skills |
---|
Dialogic (Discussion, conversation, brainstorming) |
Dialogic (Discussion, conversation, brainstorming) |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
assessment methods |
---|
Knowledge |
---|
Oral examination |
Oral examination |
Analysis of the student's performance |
Analysis of the student's performance |
Recommended literature
|
-
ČSN EN IEC 31010 ed. 2 (010352) A Management rizik - Techniky posuzování rizik. Praha, 2018.
-
ČSN ISO 31000 (010351) A Management rizik - Směrnice. Praha, 2018.
-
HROMADA, Martin, Petr HRŮZA, Josef KADERKA, Oldřich LUŇÁČEK, Miroslav NEČAS, Bohumil PTÁČEK, Leopold SKORUŠA a Richard SLOŽIL. Kybernetická bezpečnost: teorie a praxe. Praha, 2015. ISBN 978-80-87994-72-6.
-
HRŮZA, Petr, Oldřich LUŇÁČEK, Vlastimil MALÝ a Lubomír ALMER. Kybernetická bezpečnost a kritická informační infrastruktura. Praha, 2018. ISBN 978-80-7568-122-5.
-
IVANKA, Ján. Mechanické zábranné systémy. Zlín, 2015. ISBN 978-80-7454-427-9.
-
KYNCL, Jaromír a kolektiv. Bezpečnost objektu ve světle moderních technologií. Praha, 2014. ISBN 978-80-260-7115-0.
-
LUKÁŠ, Luděk a kolektiv. Bezpečnostní technologie, systémy a management III. Zlín, 2013. ISBN 978-80-87500-35-4.
-
LUKÁŠ, Luděk a kolektiv. Bezpečnostní technologie, systémy a management II.. Zlín, 2015. ISBN 978-80-87500-19-4.
-
LUKÁŠ, Luděk a kolektiv. Bezpečnostní technologie, systémy a management IV.. Zlín, 2014. ISBN 978-80-87500-57-6.
-
OSTROM, Lee T. a Cheryl A. WILHELMSEN. Risk assessment: tools, techniques, and their applications. Hoboken, 2019. ISBN 978-1-119-48346-5.
-
PORADA, Viktor a kol. Bezpečnostní vědy. Praha, 2019. ISBN 978-80-7380-758-0.
-
RAUSAND, Marvin a Stein HAUGEN. Risk assessment: theory, methods, and applications. Hoboken, 2020. ISBN 1119377226.
-
ŘEHÁK, David, Bohumír MARTÍNEK a Petra LEGIERSKÁ. Ochrana obyvatelstva v kontextu aktuálních bezpečnostních hrozeb. Ostrava, 2019. ISBN 978-80-7385-220-7.
-
ZEMAN, Tomáš, František PAULUS a Kamil BEDNÁŘ. Ochrana obyvatelstva a integrovaný záchranný systém I. Brno, 2021. ISBN 978-80-7582-384-7.
|