Lecturer(s)
|
-
Gajdošík Jiří, doc. Ing. CSc.
-
Jašek Roman, prof. Mgr. Ph.D., DBA
|
Course content
|
1. Introduction. Modern threats in information systems 2. Security of information systems, security of IS elements. 3. Security in networks, in operating systems. 4. Authentication, authorization and accounting. 5. IDS and IPS systems. Implementation of intrusion prevention. 6. Firewalls and traffic management. 7. Implementation of security technologies in LAN, WAN 8. Implementation of virtual private networks. 9. Implementation of security technologies based on crypto security 10. Security of operation and management of computer networks. 11. Operation and management of applications. 12. Monitoring of network elements and load of computer systems. Network security assessment 13. Implementation of GRE, IP SEC tunneling technology 14. Cloud security
|
Learning activities and teaching methods
|
Lecturing, Monologic (Exposition, lecture, briefing), Exercises on PC
- Participation in classes
- 56 hours per semester
- Participation in classes
- 16 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge from the field of Information and communication technologies |
Basic knowledge from the field of Information and communication technologies |
learning outcomes |
---|
Describe modern threats in information systems. |
Describe modern threats in information systems. |
Define information systems security, security of IS elements. |
Define information systems security, security of IS elements. |
Explain the concepts of authentication, authorization and accounting. |
Explain the concepts of authentication, authorization and accounting. |
Describe IDS and IPS. |
Describe IDS and IPS. |
Define the security rules for the operation and management of computer networks. |
Define the security rules for the operation and management of computer networks. |
Skills |
---|
Implement the operation and management of applications. |
Implement the operation and management of applications. |
Implement basic security technologies in LAN, WAN. |
Implement basic security technologies in LAN, WAN. |
Implement crypto-based security technologies. |
Implement crypto-based security technologies. |
Implement virtual private networks. |
Implement virtual private networks. |
Evaluate cloud security. |
Evaluate cloud security. |
teaching methods |
---|
Knowledge |
---|
Monologic (Exposition, lecture, briefing) |
Lecturing |
Monologic (Exposition, lecture, briefing) |
Exercises on PC |
Lecturing |
Exercises on PC |
assessment methods |
---|
Qualifying examination |
Qualifying examination |
Oral examination |
Oral examination |
Recommended literature
|
-
Dobda, Luboš. Ochrana dat v informačních systémech. Vyd. 1. Praha : Grada Publishing, 1998. ISBN 80-7169-479-7.
-
Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
-
Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
-
KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
-
Petr Doucek. Řízení bezpečnosti informací: 2. rozšířené vydání o BCM. Praha, 2011. ISBN 9788074310508.
-
Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
-
SOMMERVILLE, Ian. Software engineering. Boston, 2016. ISBN 978-0133943030.
|