Course: Advanced Technologies for Protecting Information and Communication Systems

« Back
Course title Advanced Technologies for Protecting Information and Communication Systems
Course code AUBI/ADOIS
Organizational form of instruction Lecture
Level of course Doctoral
Year of study not specified
Semester Winter and summer
Number of ECTS credits 10
Language of instruction Czech, English
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Malaník David, Ing. Ph.D.
  • Jašek Roman, prof. Mgr. Ph.D., DBA
  • Šenkeřík Roman, prof. Ing. Ph.D.
Course content
Threats and vulnerabilities of information and communication systems. Legislation related to information and data security. Cryptographic protection. Security monitoring of network infrastructure. Artificial intelligence in proactive protection of systems and data. Penetration testing, procedures and methodologies. OWASP.

Learning activities and teaching methods
Monologic (Exposition, lecture, briefing), Individual work of students, Dealing with situational issues - learning in situations
prerequisite
Knowledge
The student should know the basic concepts and definitions from area of safety and security and risk management.
The student should know the basic concepts and definitions from area of safety and security and risk management.
learning outcomes
The student can identify and describe potential threats and vulnerabilities to which information and communication systems are exposed.
The student can identify and describe potential threats and vulnerabilities to which information and communication systems are exposed.
The student understands the legislative aspects associated with information and data security and their application in practice.
The student understands the legislative aspects associated with information and data security and their application in practice.
The student has knowledge of cryptographic methods of data protection and communication systems.
The student has knowledge of cryptographic methods of data protection and communication systems.
The student understands the principles and methods of security monitoring of network infrastructure.
The student understands the principles and methods of security monitoring of network infrastructure.
The student has an overview of the use of artificial intelligence in the proactive protection of systems and data.
The student has an overview of the use of artificial intelligence in the proactive protection of systems and data.
Skills
The student can perform analysis and assessment of security risks in information and communication systems.
The student can perform analysis and assessment of security risks in information and communication systems.
The student can design and implement cryptographic protection mechanisms to ensure data security.
The student can design and implement cryptographic protection mechanisms to ensure data security.
The student has skills in conducting security monitoring and effective response to security incidents.
The student has skills in conducting security monitoring and effective response to security incidents.
The student is able to use artificial intelligence technologies to improve the proactive protection of systems and data.
The student is able to use artificial intelligence technologies to improve the proactive protection of systems and data.
The student can perform penetration testing, uses relevant procedures and methodologies for identifying and solving security weaknesses.
The student can perform penetration testing, uses relevant procedures and methodologies for identifying and solving security weaknesses.
teaching methods
Knowledge
Dealing with situational issues - learning in situations
Dealing with situational issues - learning in situations
Individual work of students
Individual work of students
Monologic (Exposition, lecture, briefing)
Monologic (Exposition, lecture, briefing)
assessment methods
Oral examination
Oral examination
Recommended literature
  • DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
  • JAŠEK, Roman a Milan OULEHLA. Moderní kryptografie: Průvodce světem šifrování. Praha, 2017. ISBN 978-80-87383-67-4.
  • JAŠEK, Roman a Said KRAYEM. Security of Information Systems. Zlín, 2015. ISBN 978-80-7454-565-8.
  • LUKÁŠ, Luděk. Teorie bezpečnosti I.. Zlín, 2017. ISBN 978-80-87500-89-7.
  • PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester