Lecturer(s)
|
-
Homolka Lubor, Ing. Ph.D.
-
Žáček Petr, Ing. Ph.D.
|
Course content
|
1. Crypto-environment (a) Blockchain technology (b) The Merge (c) The collapse of the Terra ecosystem 2. Cybersecurity 1 (a) The role of security in IT (b) The Internet model 3. Cybersecurity 2 (a) Types of attacks 4. Risk management standards (a) Management standards (b) GDPR, virtual identity 5. Investment/trading risk analysis (a) Data sources and APIs (b) Visualisation and indicators (c) Advanced risk indicators
|
Learning activities and teaching methods
|
unspecified
|
learning outcomes |
---|
Knowledge |
---|
Apply methods and techniques to secure a computer against external attacks. |
Apply methods and techniques to secure a computer against external attacks. |
Explain the essence of blockchain technology. |
Explain the essence of blockchain technology. |
Clarify the risks associated with holding cryptocurrencies in crypto wallets |
Clarify the risks associated with holding cryptocurrencies in crypto wallets |
Assess the costs of holding and operating with cryptocurrencies (gas). |
Assess the costs of holding and operating with cryptocurrencies (gas). |
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi). |
Design and apply an appropriate purchasing strategy for cryptocurrencies considering risk (DeFi vs CeFi). |
Skills |
---|
Uses both centralised and decentralised financial technologies. |
Uses both centralised and decentralised financial technologies. |
Uses security measures to protect personal and corporate data. |
Uses security measures to protect personal and corporate data. |
Assesses the risk level of cryptocurrencies compared to traditional instruments. |
Assesses the risk level of cryptocurrencies compared to traditional instruments. |
Explain the possibilities and limitations of implementing blockchain technologies in business practice. |
Explain the possibilities and limitations of implementing blockchain technologies in business practice. |
Utilize appropriate means for holding and managing cryptocurrencies (wallets). |
Utilize appropriate means for holding and managing cryptocurrencies (wallets). |
Recommended literature
|
-
ČASTORÁL, Z. Management rizik v současných podmínkách. Vydání I. Praha: Univerzita Jana Amose Komenského, 2017. ISBN 978-80-7452-132-4.
-
KOSTOPOULOS, G.K. Cyberspace and Cybersecurity.. Boca Raton: CRC Press, 2013. ISBN 978-1-4665-0133-1.
|