Cybersecurity concepts and strategies
| Code | Completion | Credits | Range | Language |
|---|---|---|---|---|
| B2M32KOK | Z,ZK | 6 | 2P + 2C | Czech |
- Course guarantor:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The course conceptualizes cybersecurity as a multidisciplinary field. In addition to technical aspects, it also emphasizes physical security, human factors, risk analysis and legislation. It focuses on innovative defence strategies, the psychology of cybercrime and the latest technological approaches to counter cyber threats. The course combines theoretical knowledge with practical exercises in attack protection, social engineering and ethical hacking.
- Requirements:
- Syllabus of lectures:
-
1.Cybersecurity of complex systems, technical and non-technical aspects. Current and emerging threats in cyberspace. Risk management basic overview.
2.Psychology of cybercrime - motivations and tactics of cybercriminals, attack vectors.
3.Security incident management - procedures for identifying, responding to and recovering from security incidents.
4.Practical context and application overview of cryptography - encryption and its role in data protection. Note: focus on encryption key management issues please
5.Physical and technical security - integration of physical and technological measures to protect infrastructure.
6.Advanced network security - techniques and tools for securing networks and preventing attacks.
7.The human factor in cybersecurity - the impact of human error and strategies to minimise it. Red,blue, purple etc. teaming.
8.Malware and ransomware protection - strategies for detecting and neutralizing malware.
9.Security of cloud services - specifics of data and application protection in the cloud.
10.Managerial aspects of Social engineering and phishing - methods of manipulation-based attacks and their prevention.
11.Managerial aspects of Ethical hacking and penetration testing - legal hacking as a tool to strengthen security.
12.Legal and ethical aspects of cybersecurity - legislation and ethical dilemmas in the digital world.
13.The future of cybersecurity - visions and challenges for the next generation of defence technologies
14.Contingency
- Syllabus of tutorials:
- Study Objective:
- Study materials:
-
Kutub T., Al-Sakib K. P., Cybersecurity Fundamentals A Real-World Perspective, CRC Press, 2020, ISBN: 978-0-367-47648-9
Phillip J. Windley, Learning Digital Identity, O'Reilly Media, Inc. 2023, ISBN: 9781098117696
NIST SP 800-12 Rev. 1 - An Introduction to Information Security, Michael Nieles, Kelley Dempsey, Victoria Pillitteri, 2017, online: https://csrc.nist.gov/pubs/sp/800/12/r1/final
Kathryn Knerler, Ingrid Parker, Carson Zimmerman, 11 Strategies of a World-Class Cybersecurity Operations Center, 2022 The MITRE Corporation, ISBN: 979-8-9856450-7-1, online: https://www.mitre.org/sites/default/files/2022-04/11-strategies-of-a-world-class-cybersecurity-operations-center.pdf
Ben Clark, Nick Downer, RTFM: Red Team Field Manual v2, 2022 Independently published, ISBN:978-1075091834.
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Communications and Internet of Things - Intelligent Communication Network (compulsory elective course)