Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2025/2026

Cybersecurity concepts and strategies

The course is not on the list Without time-table
Code Completion Credits Range Language
B2M32KOK Z,ZK 6 2P + 2C Czech
Course guarantor:
Lecturer:
Tutor:
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The course conceptualizes cybersecurity as a multidisciplinary field. In addition to technical aspects, it also emphasizes physical security, human factors, risk analysis and legislation. It focuses on innovative defence strategies, the psychology of cybercrime and the latest technological approaches to counter cyber threats. The course combines theoretical knowledge with practical exercises in attack protection, social engineering and ethical hacking.

Requirements:
Syllabus of lectures:

1.Cybersecurity of complex systems, technical and non-technical aspects. Current and emerging threats in cyberspace. Risk management basic overview.

2.Psychology of cybercrime - motivations and tactics of cybercriminals, attack vectors.

3.Security incident management - procedures for identifying, responding to and recovering from security incidents.

4.Practical context and application overview of cryptography - encryption and its role in data protection. Note: focus on encryption key management issues please

5.Physical and technical security - integration of physical and technological measures to protect infrastructure.

6.Advanced network security - techniques and tools for securing networks and preventing attacks.

7.The human factor in cybersecurity - the impact of human error and strategies to minimise it. Red,blue, purple etc. teaming.

8.Malware and ransomware protection - strategies for detecting and neutralizing malware.

9.Security of cloud services - specifics of data and application protection in the cloud.

10.Managerial aspects of Social engineering and phishing - methods of manipulation-based attacks and their prevention.

11.Managerial aspects of Ethical hacking and penetration testing - legal hacking as a tool to strengthen security.

12.Legal and ethical aspects of cybersecurity - legislation and ethical dilemmas in the digital world.

13.The future of cybersecurity - visions and challenges for the next generation of defence technologies

14.Contingency

Syllabus of tutorials:
Study Objective:
Study materials:

Kutub T., Al-Sakib K. P., Cybersecurity Fundamentals A Real-World Perspective, CRC Press, 2020, ISBN: 978-0-367-47648-9

Phillip J. Windley, Learning Digital Identity, O'Reilly Media, Inc. 2023, ISBN: 9781098117696

NIST SP 800-12 Rev. 1 - An Introduction to Information Security, Michael Nieles, Kelley Dempsey, Victoria Pillitteri, 2017, online: https://csrc.nist.gov/pubs/sp/800/12/r1/final

Kathryn Knerler, Ingrid Parker, Carson Zimmerman, 11 Strategies of a World-Class Cybersecurity Operations Center, 2022 The MITRE Corporation, ISBN: 979-8-9856450-7-1, online: https://www.mitre.org/sites/default/files/2022-04/11-strategies-of-a-world-class-cybersecurity-operations-center.pdf

Ben Clark, Nick Downer, RTFM: Red Team Field Manual v2, 2022 Independently published, ISBN:978-1075091834.

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2026-02-21
For updated information see http://bilakniha.cvut.cz/en/predmet8611206.html