Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Introduction to Cybersecurity

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BI-UKB.21 Z,ZK 5 3P+1C Czech
Course guarantor:
Jan Bělohoubek
Lecturer:
Tomáš Luňák, David Pokorný, Ivana Trummová
Tutor:
Jan Bělohoubek, František Kovář, Martin Mandík, David Pokorný, Jakub Tetera, Ivana Trummová
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to provide students with the introduction of basic concepts in modern approach to cybersecurity. Students will get a basic overview of threats in cyberspace and attacker techniques, security mechanisms in networks, operating systems and applications, as well as of basic cyberspace regulations.

Requirements:

Entry knowledge is not required.

Syllabus of lectures:

1. Introduction, definition of cybersecurity and basic concepts.

2. Threat modeling, adversarial profile, threat intelligence.

3. Cybercrime and its economics.

4. Cyberrisk management.

5. Protocols in cyber security.

6. Network security.

7. Operating systems security, security aspects of operating system level virtualization.

8. Web and mobile security.

9. Security development lifecycle, introduction to concepts of application security.

10. Cyberphysical systems, Internet of Things.

11. Critical infrastructure, industrial control systems

12. Cybersecurity and privacy.

13. Law and regulations in cyberspace.

Syllabus of tutorials:

1. Threat Modelling, Data Flow Diagrams, Threat Modelling assignment

2. Risk management concepts

3. Attacks on network layer

4. Web application attacks

5. Privacy considerations, privacy domains, practical privacy analysis

Study Objective:
Study materials:

1. Anderson R. : Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2008. ISBN 978-0-470-06852-6.

2. Wheeler E. : Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Syngress, 2011. ISBN 978-1597496155.

3. Stallings W. : Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional, 2018. ISBN 978-0134772806.

4. Adnress J. : Foundations of Information Security. No Starch Press, 2019. ISBN 978-1718500044.

5. Cunningham Ch. : Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare. Packt Publishing, 2020. ISBN 978-1839216992.

Note:
Further information:
https://courses.fit.cvut.cz/BI-UKB/
Time-table for winter semester 2024/2025:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
roomT9:351
Pokorný D.
16:15–17:45
ODD WEEK

(lecture parallel1
parallel nr.101)

Dejvice
roomT9:351
Pokorný D.
18:00–19:30
ODD WEEK

(lecture parallel1
parallel nr.102)

Dejvice
Tue
roomT9:348
Tetera J.
18:00–19:30
ODD WEEK

(lecture parallel1
parallel nr.103)

Dejvice
Wed
Thu
roomJP:B-671
Luňák T.
Pokorný D.

08:15–10:45
(lecture parallel1)
Jugoslávských partyzánů 3
roomT9:351
Mandík M.
16:15–17:45
ODD WEEK

(lecture parallel1
parallel nr.104)

Dejvice
Fri
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2025-01-20
For updated information see http://bilakniha.cvut.cz/en/predmet6549506.html