Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025
NOTICE: Study plans for the following academic year are available.

Information security

The course is not on the list Without time-table
Code Completion Credits Range Language
UNIK-IB Z,ZK 5 18B Czech
Course guarantor:
Michal Valenta
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

The course covers the area of description of basic cryptographic schemes and also introduces students to the basics of network and system security. Great attention is paid to current topics of cyber security, such as ethical hacking, penetration testing and malware. At the end of the course students are introduced to the issues of secure programming, security of web applications. Student learns how to avoid traps that can be set for users and thus basics of safe behavior of users and risk minimization.

Requirements:
Syllabus of lectures:

1.Mathematical basics of cryptography and its security, computational complexity.

2.Block ciphers, stream ciphers, hashing functions.

3.Asymmetric schematics of encryption and digital signature.

4.Basic principles of information security. Confidentiality, integrity, authentication.

5.Network security, traffic monitoring, analysis of data protocols in the network.

6.System security, physical, system and network security connection.

7.Penetration testing and ethical hacking.

8.Methods of defence against attacks, response to a security incident.

9.Digital forensic analysis.

10.Malware and its detection.

11.Basic secure programming.

12.Web application security.

13.Principles of secure user behaviour.

Syllabus of tutorials:

The exercises follow the content of the lectures with an emphasis on application practice for high school students. The exercises are practical and the students test possible threats, their detection and defense against them.

Study Objective:

Introducing the teacher program student to the basics of information security so that the future teacher not only knows how to behave safely in the IT environment in the broadest sense (use of Internet services, data security including backup, mobile applications and communications, cloud, IoT), but is able to pass on this knowledge and skills to secondary school students and thus contribute to increasing literacy in the field of information security for the young generation.

Study materials:

Mandatory:

Padhye, S., Sahu, R. A., Saraswat, V.: Introduction to Cryptography, CRC Press, July 2018, ISBN 9781138071537

Recommended:

Paar, CH., Pelzl, J.: Understanding Cryptography, Springer, 2009.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A.: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996

Note:
Further information:
nutno doplnit
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2025-03-26
For updated information see http://bilakniha.cvut.cz/en/predmet8246706.html