Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025
NOTICE: Study plans for the following academic year are available.

Cybersecurity and IT Risk Management

The course is not on the list Without time-table
Code Completion Credits Range Language
126YKBR Z 2 2C Czech
Course guarantor:
Lecturer:
Tutor:
Supervisor:
Department of Construction Management and Economics
Synopsis:

The course provides students with a broad spectrum of knowledge and skills in the field of cyber security and risk management in an IT environment. Upon completion of the course, students will be able to successfully identify and minimize risks associated with cyber security within the construction industry. Students will also be able to understand international standards and guidelines for cyber security, as well as relevant Czech legislation.

Requirements:
Syllabus of lectures:
Syllabus of tutorials:

1. Fundamentals of Cyber Security and Risk Management in IT

2. ISO 27001 and Other International Standards for Cyber Security

3. Legislation in the Field of Cyber Security

4. Information Security Management System (ISMS)

5. Risk Management in Project Management and IT Solution Implementation

6. Cryptography, Data Protection, and Encryption

7. Information Systems and Their Security

8. Security in Building Information Modeling (BIM) Environment

9. Cyber Attacks, Their Detection, and Security Incident Management

10. Methods of Preventing Cyber Attacks

11. Network and Network Service Security

12. Vulnerability Analysis and Penetration Testing

13. Cyber Security in Industry 4.0

Study Objective:

Master the basics of cyber security issues in connection with the construction industry. Gain a general overview of the possibilities for protecting key information systems.

Study materials:

ISO/IEC 27001:2022 Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements. ISO, 2022.

ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection Information security controls. ISO, 2022.

ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection Guidance on managing information security risks. ISO, 2022.

SMĚRNICE EVROPSKÉHO PARLAMENTU A RADY o opatřeních k zajištění vysoké společné úrovně kybernetické bezpečnosti v Unii a o zrušení směrnice (EU) 2016/1148 (NIS2). EU, 2016.

Vyhláška o kybernetické bezpečnosti (82/2018 Sb.)

Erickson, Jon. Hacking the Art of Exploitation:Jon Erickson. No Starch Press, 2008.

Alexander, David, et al. Information Security Management Principles. BCS, The Chartered Institute for IT, 2013.

Death, Darren. Information Security Handbook: Develop a Threat Model and Incident Response Strategy to Build a Strong Information Security Framework. Packt Publishing, 2017.

Baloch, Rafay. Ethical Hacking and Penetration Testing Guide. CRC Press, 2017.

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2025-04-18
For updated information see http://bilakniha.cvut.cz/en/predmet8124406.html