Course: Applied Cyber Security

« Back
Course title Applied Cyber Security
Course code LUOO/L8SAK
Organizational form of instruction Lecture + Seminary
Level of course Master
Year of study 1
Semester Summer
Number of ECTS credits 5
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Svoboda Petr, Ing. Ph.D.
  • Pavlík Lukáš, Ing. Ph.D.
Course content
1. Basic conceptual framework of the Cyber Security Act. 2. History and present in the field of cyber threats. 3. Cyber warfare. 4. Hybrid threats in the context of cyber security. 5. Procedures for ensuring the cyber security of entities falling under the Cyber Security Act. 6. Procedures for ensuring cyber security of entities in accordance with a series of ISO/IEC 27000 standards. 7. Risk analysis in the context of cyber security. 8. Modeling cyber threat scenarios. 9. Principles of secure information transfer in information systems. 10. Cyber security of production processes and industrial systems. 11. Cyber security in terms of computer security. 12. Possibilities of using internet tools and their cyber security in the area of logistics and crisis management systems. 13. Current challenges in the field of cyber security (remote work, Mobile Device Management, Bring Your Own Device and others).

Learning activities and teaching methods
  • Term paper - 28 hours per semester
  • Participation in classes - 52 hours per semester
  • Preparation for course credit - 20 hours per semester
  • Preparation for examination - 25 hours per semester
learning outcomes
Knowledge
Describe the legislative anchoring of cyber security
Describe the legislative anchoring of cyber security
Describe cybersecurity risk management processes
Describe cybersecurity risk management processes
Explain the role, purpose and content of the current directive of the Information Security Management System
Explain the role, purpose and content of the current directive of the Information Security Management System
Characterize current threats in cyberspace
Characterize current threats in cyberspace
Define modern approaches to increase the level of cyber security of the entity
Define modern approaches to increase the level of cyber security of the entity
Skills
Identify the cyber assets of the selected entity
Identify the cyber assets of the selected entity
Identify cyber threats in the selected entity
Identify cyber threats in the selected entity
Conduct an entity cyber security risk analysis
Conduct an entity cyber security risk analysis
To propose measures to improve the current state of cyber security of the subject
To propose measures to improve the current state of cyber security of the subject
Specify the possible scenarios of breaching the subject's cyber security
Specify the possible scenarios of breaching the subject's cyber security
teaching methods
Knowledge
E-learning
E-learning
Individual work of students
Individual work of students
Lecturing
Lecturing
assessment methods
Analysis of seminar paper
Analysis of seminar paper
Written examination
Written examination
Oral examination
Oral examination
Recommended literature
  • BROOKS, Charles et al. Cybersecurity Essentials. John Wiley, 2018. ISBN 978-1-119-36239-5.
  • DOUCEK, Petr, Martin KONEČNÝ a Luděk NOVÁK. Řízení kybernetické bezpečnosti a bezpečnosti informací. Praha, 2019. ISBN 978-80-88260-39-4.
  • EVANS, Lester. Cybersecurity: What You Need to Know About Computer and CyberSecurity, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners. USA, 2019. ISBN 9781794647237.
  • JOHNSON, Thomas A. Cybersecurity: Protecting Critical Infrastructers from Cyber Attack and Cyber Warfare. 6000 Broken Sound Parkway NW, Suite 300, 2015. ISBN 978-1-4822-3923-2.
  • KOLOUCH, Jan a Pavel BAŠTA. CyberSecurity. Praha, 2019. ISBN 978-80-88168-31-7.
  • KOLOUCH, Jan. CyberCrime. Praha, 2016. ISBN 978-80-88168-15-7.
  • SHICK, Nina. Deep Fakes and the Infocalypse: What You Urgently Need To Know. Monoray, 2020. ISBN 978-1913183523.
  • SMEJKAL, Vladimír, Tomáš SOKOL a Jindřich KODL. Bezpečnost informačních systémů podle zákona o kybernetické bezpečnosti. Plzeň, 2019. ISBN 978-80-7380-765-8.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester