Course: Security Technologies for Protection of

« Back
Course title Security Technologies for Protection of
Course code AUIUI/AE8BT
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 3
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Gajdošík Jiří, doc. Ing. CSc.
  • Jašek Roman, prof. Mgr. Ph.D., DBA
Course content
1. Introduction. Modern threats in information systems 2. Security of information systems, security of IS elements. 3. Security in networks, in operating systems. 4. Authentication, authorization and accounting. 5. IDS and IPS systems. Implementation of intrusion prevention. 6. Firewalls and traffic management. 7. Implementation of security technologies in LAN, WAN 8. Implementation of virtual private networks. 9. Implementation of security technologies based on crypto security 10. Security of operation and management of computer networks. 11. Operation and management of applications. 12. Monitoring of network elements and load of computer systems. Network security assessment 13. Implementation of GRE, IP SEC tunneling technology 14. Cloud security

Learning activities and teaching methods
Lecturing, Monologic (Exposition, lecture, briefing), Exercises on PC
  • Participation in classes - 56 hours per semester
  • Participation in classes - 16 hours per semester
prerequisite
Knowledge
Basic knowledge from the field of Information and communication technologies
Basic knowledge from the field of Information and communication technologies
learning outcomes
Describe modern threats in information systems.
Describe modern threats in information systems.
Define information systems security, security of IS elements.
Define information systems security, security of IS elements.
Explain the concepts of authentication, authorization and accounting.
Explain the concepts of authentication, authorization and accounting.
Describe IDS and IPS.
Describe IDS and IPS.
Define the security rules for the operation and management of computer networks.
Define the security rules for the operation and management of computer networks.
Skills
Implement the operation and management of applications.
Implement the operation and management of applications.
Implement basic security technologies in LAN, WAN.
Implement basic security technologies in LAN, WAN.
Implement crypto-based security technologies.
Implement crypto-based security technologies.
Implement virtual private networks.
Implement virtual private networks.
Evaluate cloud security.
Evaluate cloud security.
teaching methods
Knowledge
Monologic (Exposition, lecture, briefing)
Lecturing
Monologic (Exposition, lecture, briefing)
Exercises on PC
Lecturing
Exercises on PC
assessment methods
Qualifying examination
Qualifying examination
Oral examination
Oral examination
Recommended literature
  • Dobda, Luboš. Ochrana dat v informačních systémech. Vyd. 1. Praha : Grada Publishing, 1998. ISBN 80-7169-479-7.
  • Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
  • Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
  • KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
  • Petr Doucek. Řízení bezpečnosti informací: 2. rozšířené vydání o BCM. Praha, 2011. ISBN 9788074310508.
  • Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
  • SOMMERVILLE, Ian. Software engineering. Boston, 2016. ISBN 978-0133943030.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester