Course: Applied Cyber Security

« Back
Course title Applied Cyber Security
Course code LUOO/L8SKB
Organizational form of instruction Lecture + Seminary
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Svoboda Petr, Ing. Ph.D.
Course content
The subject includes topics: - The basic conceptual apparatus of the Cyber Act for the study of cyber security. - History and present in the field of cyber threats. - Cyber warfare. - Hybrid threats in the context of cyber security. - Framework possibilities of using the theory and application of attack diagnostics to increase the cyber security of systems. - Possibilities of applying the recovery theory in the processes of active cyber security of systems. - Use of operational research methods to optimize cyber security from the point of view of logistics, process engineering, risk and crisis management of systems. - Procedures for ensuring the cyber security of entities falling under the Cyber Security Act. - Procedures for ensuring cyber security of entities in accordance with a series of ISO/IEC 27000 standards. - Risk analysis in the context of cyber security. - Modeling cyber threat scenarios. - Security management in the processes of cyber attacks and data protection (status space of the automated management system). - Possibilities of using internet tools and their cyber security in the area of logistics and crisis management systems. - Principles of secure information transfer in information systems.

Learning activities and teaching methods
Lecturing, Individual work of students, E-learning
  • Term paper - 20 hours per semester
  • Participation in classes - 56 hours per semester
  • Preparation for course credit - 10 hours per semester
  • Preparation for examination - 20 hours per semester
prerequisite
Knowledge
Education qualification of the successful mastered subject is systematic preparation and study prescribed and recommended literature.
Education qualification of the successful mastered subject is systematic preparation and study prescribed and recommended literature.
learning outcomes
Describe the legislative anchoring of cyber security
Describe the legislative anchoring of cyber security
Describe cybersecurity risk management processes
Describe cybersecurity risk management processes
Explain the role, purpose and content of the current directive of the Information Security Management System
Explain the role, purpose and content of the current directive of the Information Security Management System
Characterize current threats in cyberspace
Characterize current threats in cyberspace
Define modern approaches to increase the level of cyber security of the entity
Define modern approaches to increase the level of cyber security of the entity
Skills
Identify the cyber assets of the selected entity
Identify the cyber assets of the selected entity
Identify cyber threats in the selected entity
Identify cyber threats in the selected entity
Conduct an entity cyber security risk analysis
Conduct an entity cyber security risk analysis
To propose measures to improve the current state of cyber security of the subject
To propose measures to improve the current state of cyber security of the subject
Specify the possible scenarios of breaching the subject's cyber security
Specify the possible scenarios of breaching the subject's cyber security
teaching methods
Knowledge
Individual work of students
Individual work of students
Lecturing
Lecturing
E-learning
E-learning
assessment methods
Written examination
Written examination
Oral examination
Oral examination
Analysis of seminar paper
Analysis of seminar paper
Recommended literature
  • Basl, Josef a Blažíček, Roman. Podnikové informační systémy: podnik v informační společnosti. 2012. ISBN 978-80-247-4307-3.
  • Čapek Jan. Teoretické základy informatiky: distanční opora. 2013. ISBN 978-80-7395-574-8.
  • Čech, Ondřej. Nebezpečí kyberšikany: internet jako zbraň?. 2017. ISBN 978-80-904854-4-0.
  • Donát, Josef a Tomíšek, Jan. Právo v síti: průvodce právem na internetu. 2016. ISBN 978-80-7400-610-4.
  • Dunnigan, James F. Bojiště zítřka: tváří v tvář globální hrozbě kybernetického terorismu. 2004. ISBN 80-7214-642-4.
  • Harding, Luke. Akta Snowden: úplný příběh nejhledanějšího muže světa. 2017. ISBN 978-80-264-1595-4.
  • Jirovský, Václav. Kybernetická kriminalita: nejen o hackingu, crackingu, virech a trojských koních bez tajemství. 2007. ISBN 978-80-247-1561-2.
  • Kohout, Roman. Internetem bezpečně. 2017. ISBN 978-80-270-2440-7.
  • Kožíšek, Martin a Písecký, Václav. Bezpečně n@ internetu: průvodce chováním ve světě online. 2016. ISBN 978-80-247-5595-3.
  • Maisner, Martin. Zákon o kybernetické bezpečnosti: komentář. 2015. ISBN 978-80-7478-817-8.
  • Smejkal, Vladimír. Kybernetická kriminalita. 2015. ISBN 978-80-7380-501-2.
  • Stowell, Louie. Bezpečně online. 2017. ISBN 978-80-256-2083-0.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester