Cybersecurity and IT Risk Management
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
126YKBR | Z | 2 | 2C | Czech |
- Course guarantor:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Construction Management and Economics
- Synopsis:
-
The course provides students with a broad spectrum of knowledge and skills in the field of cyber security and risk management in an IT environment. Upon completion of the course, students will be able to successfully identify and minimize risks associated with cyber security within the construction industry. Students will also be able to understand international standards and guidelines for cyber security, as well as relevant Czech legislation.
- Requirements:
- Syllabus of lectures:
- Syllabus of tutorials:
-
1. Fundamentals of Cyber Security and Risk Management in IT
2. ISO 27001 and Other International Standards for Cyber Security
3. Legislation in the Field of Cyber Security
4. Information Security Management System (ISMS)
5. Risk Management in Project Management and IT Solution Implementation
6. Cryptography, Data Protection, and Encryption
7. Information Systems and Their Security
8. Security in Building Information Modeling (BIM) Environment
9. Cyber Attacks, Their Detection, and Security Incident Management
10. Methods of Preventing Cyber Attacks
11. Network and Network Service Security
12. Vulnerability Analysis and Penetration Testing
13. Cyber Security in Industry 4.0
- Study Objective:
-
Master the basics of cyber security issues in connection with the construction industry. Gain a general overview of the possibilities for protecting key information systems.
- Study materials:
-
ISO/IEC 27001:2022 Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements. ISO, 2022.
ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection Information security controls. ISO, 2022.
ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection Guidance on managing information security risks. ISO, 2022.
SMĚRNICE EVROPSKÉHO PARLAMENTU A RADY o opatřeních k zajištění vysoké společné úrovně kybernetické bezpečnosti v Unii a o zrušení směrnice (EU) 2016/1148 (NIS2). EU, 2016.
Vyhláška o kybernetické bezpečnosti (82/2018 Sb.)
Erickson, Jon. Hacking the Art of Exploitation:Jon Erickson. No Starch Press, 2008.
Alexander, David, et al. Information Security Management Principles. BCS, The Chartered Institute for IT, 2013.
Death, Darren. Information Security Handbook: Develop a Threat Model and Incident Response Strategy to Build a Strong Information Security Framework. Packt Publishing, 2017.
Baloch, Rafay. Ethical Hacking and Penetration Testing Guide. CRC Press, 2017.
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Digitalizace ve stavebnictví - prezenční forma studia (compulsory elective course)