Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Applications of Security in Technology

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BI-TAB.21 Z,ZK 5 2P+2C Czech
Course guarantor:
Jiří Dostál
Lecturer:
Jiří Dostál, Martin Pozděna
Tutor:
Jiří Dostál, Martin Pozděna
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries. Students get a broader overview of cybersecurity applications and extend their knowledge from the cryptology, the secure code, and system, network, and hardware security.

Requirements:

Prerequisites and co-requisites Basic knowledge of BI-KAB is assumed.

Syllabus of lectures:

1. Secure wireless transfers.

2. Software Defined Radio.

4. Mobile networks.

5. Internet of Things security.

6. Automotive security architecture

7. Global navigation satellite systems.

8. Precise time in the Internet.

9. Healthcare security.

10. Security of industrial control systems.

11. Blockchain technology.

12. Security and artificial intelligence.

13. Smart Cities security.

Syllabus of tutorials:

1. Secure wireless transfers.

2. Software Defined Radio.

4. Mobile networks.

5. Internet of Things security.

6. Automotive security architecture

7. Global navigation satellite systems.

8. Precise time in the Internet.

9. Healthcare security.

10. Security of industrial control systems.

11. Blockchain technology.

12. Security and artificial intelligence.

13. Smart Cities security.

Study Objective:

The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries.

Study materials:

1. Bejtlich R. : The Practice of Network Security Monitoring. No Starch Press, 2013. ISBN 978-1-59327-509-9.

2. Stallings W. : Network Security Essentials: Applications and Standards (6th Edition). Pearson, 2016. ISBN 978-0134527338.

3. Forshaw J. : Attacking Network Protocols. No Starch Press, 2017. ISBN 978-1593277505.

Note:
Time-table for winter semester 2024/2025:
Time-table is not available yet
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2025-01-09
For updated information see http://bilakniha.cvut.cz/en/predmet6557506.html