Introduction to Cybersecurity
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIE-UKB.21 | Z,ZK | 5 | 3P+1C | English |
- Course guarantor:
- Jan Bělohoubek
- Lecturer:
- Jan Bělohoubek, David Pokorný, Ivana Trummová
- Tutor:
- Tomáš Rabas
- Supervisor:
- Department of Information Security
- Synopsis:
-
The goal of the course is to provide students with the introduction of basic concepts in modern approach to cybersecurity. Students will get a basic overview of threats in cyberspace and attacker techniques, security mechanisms in networks, operating systems and applications, as well as of basic cyberspace regulations.
- Requirements:
-
Entry knowledge is not required.
- Syllabus of lectures:
-
1. Introduction, definition of cybersecurity and basic concepts.
2. Threat modeling, adversarial profile, threat intelligence.
3. Cybercrime and its economics.
4. Cyberrisk management.
5. Protocols in cyber security.
6. Network security.
7. Operating systems security, security aspects of operating system level virtualization.
8. Web and mobile security.
9. Security development lifecycle, introduction to concepts of application security.
10. Cyberphysical systems, Internet of Things.
11. Critical infrastructure, industrial control systems
12. Cybersecurity and privacy.
13. Law and regulations in cyberspace.
- Syllabus of tutorials:
-
1. Threat Modelling, Data Flow Diagrams, Threat Modelling assignment
2. Risk management concepts
3. Attacks on network layer
4. Web application attacks
5. Privacy considerations, privacy domains, practical privacy analysis
- Study Objective:
- Study materials:
-
1. Anderson R. : Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2008. ISBN 978-0-470-06852-6.
2. Wheeler E. : Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Syngress, 2011. ISBN 978-1597496155.
3. Stallings W. : Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional, 2018. ISBN 978-0134772806.
4. Adnress J. : Foundations of Information Security. No Starch Press, 2019. ISBN 978-1718500044.
5. Cunningham Ch. : Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare. Packt Publishing, 2020. ISBN 978-1839216992.
- Note:
- Further information:
- https://courses.fit.cvut.cz/BIE-UKB/
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Bachelor Specialization, Information Security, 2021 (PS)
- Bachelor Specialization, Software Engineering, 2021 (VO)
- Bachelor Specialization, Computer Science, 2021 (VO)
- Bachelor Specialization, Computer Networks and Internet, 2021 (VO)
- Bachelor Specialization Computer Systems and Virtualization, 2021 (VO)
- Bachelor Specialization, Computer Engineering, Version 2024 (VO)