Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Applications of Security in Technology

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BI-TAB.21 Z,ZK 5 2P+2C Czech
Garant předmětu:
Jiří Dostál
Lecturer:
Jiří Dostál, Martin Pozděna
Tutor:
Jiří Dostál, Martin Pozděna
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries. Students get a broader overview of cybersecurity applications and extend their knowledge from the cryptology, the secure code, and system, network, and hardware security.

Requirements:

Prerequisites and co-requisites Basic knowledge of BI-KAB is assumed.

Syllabus of lectures:

1. Secure wireless transfers.

2. Software Defined Radio.

4. Mobile networks.

5. Internet of Things security.

6. Automotive security architecture

7. Global navigation satellite systems.

8. Precise time in the Internet.

9. Healthcare security.

10. Security of industrial control systems.

11. Blockchain technology.

12. Security and artificial intelligence.

13. Smart Cities security.

Syllabus of tutorials:

1. Secure wireless transfers.

2. Software Defined Radio.

4. Mobile networks.

5. Internet of Things security.

6. Automotive security architecture

7. Global navigation satellite systems.

8. Precise time in the Internet.

9. Healthcare security.

10. Security of industrial control systems.

11. Blockchain technology.

12. Security and artificial intelligence.

13. Smart Cities security.

Study Objective:

The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries.

Study materials:

1. Bejtlich R. : The Practice of Network Security Monitoring. No Starch Press, 2013. ISBN 978-1-59327-509-9.

2. Stallings W. : Network Security Essentials: Applications and Standards (6th Edition). Pearson, 2016. ISBN 978-0134527338.

3. Forshaw J. : Attacking Network Protocols. No Starch Press, 2017. ISBN 978-1593277505.

Note:
Time-table for winter semester 2023/2024:
Time-table is not available yet
Time-table for summer semester 2023/2024:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
Wed
roomT9:351
Dostál J.
16:15–17:45
(lecture parallel1)
Dejvice
NBFIT PC ucebna
roomT9:351
Dostál J.
18:00–19:30
(lecture parallel1
parallel nr.101)

Dejvice
NBFIT PC ucebna
Thu
Fri
The course is a part of the following study plans:
Data valid to 2024-05-25
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6557506.html