| NIE-KRY |
Advanced Cryptology
|
English |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| NI-KRY |
Advanced Cryptology
|
Czech |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| NIE-AIB |
Algorithms of Information Security
|
English |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |
| NI-AIB |
Algorithms of Information Security
|
Czech |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |
| BIE-TAB.21 |
Applications of Security in Technology
|
English |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BIK-TAB.21 |
Applications of Security in Technology
|
Czech |
|
|
|
Z,ZK |
5 |
14KP+4KC |
The course is not on the list |
| BI-TAB.21 |
Applications of Security in Technology
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BI-ASB.21 |
Applied Network Security
|
Czech |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| BIK-ASB.21 |
Applied Network Security
|
Czech |
Z,ZK |
5 |
14KP+4KC |
|
|
|
The course is not on the list |
| BIE-ASB.21 |
Applied Network Security
|
English |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| PI-ANM |
Applied Numerical Mathematics
|
|
ZK |
4 |
3C |
ZK |
4 |
3C |
B252, B251 |
| BIE-ZSB.21 |
Basics of System Security
|
English |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| BIK-ZSB.21 |
Basics of System Security
|
Czech |
Z,ZK |
5 |
14KP+4KC |
|
|
|
B251 |
| BI-ZSB.21 |
Basics of System Security
|
Czech |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| DD-BLO.23 |
Blockchain
|
English |
Z,ZK |
5 |
1P+2C |
|
|
|
The course is not on the list |
| NIE-BLO |
Blockchain
|
English |
Z,ZK |
5 |
1P+2C |
|
|
|
B251 |
| NI-CTF |
Capture The Flag
|
Czech |
KZ |
4 |
3C |
KZ |
4 |
3C |
B251 |
| NI-CF1 |
Capture the Flag 1
|
Czech |
KZ |
4 |
3C |
|
|
|
The course is not on the list |
| NI-CF2 |
Capture the Flag 2
|
Czech |
|
|
|
KZ |
4 |
3C |
B252 |
| BIE-KAB.21 |
Cryptography and SecurityJiří Buček, Martin Jureček, Filip Kodýtek, Josef Kokeš, František Kovář, Jaroslav Kříž, Róbert LórenczⒼ, David Pokorný, Ivana Trummová, Tomáš Zahradnický, Martin Šutovský
|
English |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BI-KAB.21 |
Cryptography and SecurityJanis Berberi, Jiří Buček, Martin Jureček, Josef Kokeš, František Kovář, Filip Kresl, Róbert LórenczⒼ, Julia Plotnikova, David Pokorný, Tomáš Rabas, Matyáš Rak, Tomáš Suda, Jakub Tetera, Ivana Trummová, Tomáš Zahradnický, Martin Šutovský
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BIK-KAB.21 |
Cryptography and Security
|
Czech |
|
|
|
Z,ZK |
5 |
14KP+4KC |
B252 |
| QNIE-KKP |
Cryptology and Quantum Computing
|
English |
|
|
|
|
|
|
The course is not on the list |
| QNI-KKP |
Cryptology and Quantum Computing
|
Czech |
Z,ZK |
6 |
2P+2C |
|
|
|
The course is not on the list |
| NI-KYB |
Cybernality
|
Czech |
ZK |
5 |
2P |
|
|
|
The course is not on the list |
| PI-ESC |
Embeded SeCurity
|
|
ZK |
4 |
3C |
|
|
|
B252, B251 |
| BIE-EHA.21 |
Ethical Hacking
|
English |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BI-EHA |
Ethical Hacking
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
The course is not on the list |
| BI-EHA.21 |
Ethical Hacking
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BIK-EHA.21 |
Ethical Hacking
|
Czech |
|
|
|
Z,ZK |
5 |
14KP+4KC |
The course is not on the list |
| NIE-HWB |
Hardware Security
|
English |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BIE-HWB.21 |
Hardware Security
|
English |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| BIK-HWB |
Hardware Security
|
Czech |
Z,ZK |
5 |
14KP+4KC |
|
|
|
The course is not on the list |
| BI-HWB.21 |
Hardware Security
|
Czech |
Z,ZK |
5 |
2P+2C |
|
|
|
B251 |
| BIK-HWB.21 |
Hardware Security
|
Czech |
Z,ZK |
5 |
14KP+4KC |
|
|
|
The course is not on the list |
| NI-HWB |
Hardware Security
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BI-HAS |
Human Aspects in Cryptography and Security
|
Czech |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |
| BIE-HAS |
Human Factors in Cryptography and Security
|
English |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |
| NI-IBE |
Information Security
|
Czech |
ZK |
2 |
2P |
|
|
|
The course is not on the list |
| UNIK-IB |
Information security
|
Czech |
|
|
|
Z,ZK |
5 |
18B |
The course is not on the list |
| UNI-IB |
Information security
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| NI-UFA |
Introduction into digital forensics analysis
|
Czech |
|
|
|
|
|
|
B252 |
| BIE-UKB.21 |
Introduction to Cybersecurity
|
English |
Z,ZK |
5 |
3P+1C |
|
|
|
B251 |
| BI-UKB.21 |
Introduction to Cybersecurity
|
Czech |
Z,ZK |
5 |
3P+1C |
|
|
|
B251 |
| BIK-UKB.21 |
Introduction to Cybersecurity
|
Czech |
Z,ZK |
5 |
21KP+2KC |
|
|
|
The course is not on the list |
| NI-MKY.26 |
Mathematics for Cryptology
|
Czech |
|
|
|
Z,ZK |
7 |
3P+2C |
The course is not on the list |
| NI-MKY |
Mathematics for Cryptology
|
Czech |
|
|
|
Z,ZK |
5 |
3P+1C |
B252 |
| NIE-MKY.26 |
Mathematics for Cryptology
|
English |
|
|
|
Z,ZK |
7 |
3P+2C |
The course is not on the list |
| NIE-MKY |
Mathematics for Cryptology
|
English |
|
|
|
Z,ZK |
5 |
3P+1C |
B252 |
| NI-HCM |
Mind Hacking
|
Czech |
ZK |
5 |
2P+1C |
|
|
|
B251 |
| NIE-SIB |
Network Security
|
English |
|
|
|
Z,ZK |
5 |
2P+1C |
B252 |
| NI-SIB |
Network Security
|
Czech |
|
|
|
Z,ZK |
5 |
2P+1C |
B252 |
| PI-KIK |
Quantum Information and Quantum Cryptography
|
|
|
|
|
ZK |
4 |
3C |
The course is not on the list |
| MIE-REV.16 |
Reverse Engineering
|
English |
Z,ZK |
5 |
1P+2C |
|
|
|
The course is not on the list |
| NIE-REV |
Reverse Engineering
|
English |
Z,ZK |
5 |
1P+2C |
|
|
|
B251 |
| NI-REV |
Reverse Engineering
|
Czech |
Z,ZK |
5 |
1P+2C |
|
|
|
B251 |
| BI-BEK.21 |
Secure Code
|
Czech |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| BIK-BEK.21 |
Secure Code
|
Czech |
|
|
|
Z,ZK |
5 |
14KP+4KC |
The course is not on the list |
| BIE-BEK.21 |
Secure Code
|
English |
|
|
|
Z,ZK |
5 |
2P+2C |
B252 |
| NIE-SBF |
System Security and Forensics
|
English |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |
| NI-SBF |
System Security and Forensics
|
Czech |
Z,ZK |
5 |
2P+1C |
|
|
|
B251 |