Lecturer(s)
|
-
Malaník David, Ing. Ph.D.
-
Jašek Roman, prof. Mgr. Ph.D., DBA
-
Šenkeřík Roman, prof. Ing. Ph.D.
|
Course content
|
Threats and vulnerabilities of information and communication systems. Legislation related to information and data security. Cryptographic protection. Security monitoring of network infrastructure. Artificial intelligence in proactive protection of systems and data. Penetration testing, procedures and methodologies. OWASP.
|
Learning activities and teaching methods
|
Monologic (Exposition, lecture, briefing), Individual work of students, Dealing with situational issues - learning in situations
|
prerequisite |
---|
Knowledge |
---|
The student should know the basic concepts and definitions from area of safety and security and risk management. |
The student should know the basic concepts and definitions from area of safety and security and risk management. |
learning outcomes |
---|
The student can identify and describe potential threats and vulnerabilities to which information and communication systems are exposed. |
The student can identify and describe potential threats and vulnerabilities to which information and communication systems are exposed. |
The student understands the legislative aspects associated with information and data security and their application in practice. |
The student understands the legislative aspects associated with information and data security and their application in practice. |
The student has knowledge of cryptographic methods of data protection and communication systems. |
The student has knowledge of cryptographic methods of data protection and communication systems. |
The student understands the principles and methods of security monitoring of network infrastructure. |
The student understands the principles and methods of security monitoring of network infrastructure. |
The student has an overview of the use of artificial intelligence in the proactive protection of systems and data. |
The student has an overview of the use of artificial intelligence in the proactive protection of systems and data. |
Skills |
---|
The student can perform analysis and assessment of security risks in information and communication systems. |
The student can perform analysis and assessment of security risks in information and communication systems. |
The student can design and implement cryptographic protection mechanisms to ensure data security. |
The student can design and implement cryptographic protection mechanisms to ensure data security. |
The student has skills in conducting security monitoring and effective response to security incidents. |
The student has skills in conducting security monitoring and effective response to security incidents. |
The student is able to use artificial intelligence technologies to improve the proactive protection of systems and data. |
The student is able to use artificial intelligence technologies to improve the proactive protection of systems and data. |
The student can perform penetration testing, uses relevant procedures and methodologies for identifying and solving security weaknesses. |
The student can perform penetration testing, uses relevant procedures and methodologies for identifying and solving security weaknesses. |
teaching methods |
---|
Knowledge |
---|
Dealing with situational issues - learning in situations |
Dealing with situational issues - learning in situations |
Individual work of students |
Individual work of students |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
assessment methods |
---|
Oral examination |
Oral examination |
Recommended literature
|
-
DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
-
JAŠEK, Roman a Milan OULEHLA. Moderní kryptografie: Průvodce světem šifrování. Praha, 2017. ISBN 978-80-87383-67-4.
-
JAŠEK, Roman a Said KRAYEM. Security of Information Systems. Zlín, 2015. ISBN 978-80-7454-565-8.
-
LUKÁŠ, Luděk. Teorie bezpečnosti I.. Zlín, 2017. ISBN 978-80-87500-89-7.
-
PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.
|