Introduction to Cybersecurity
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIE-UKB.21 | Z,ZK | 5 | 3P+1C | English |
- Garant předmětu:
- Róbert Lórencz
- Lecturer:
- Jan Bělohoubek, Simona Fornůsek, Tomáš Luňák, David Pokorný, Ivana Trummová
- Tutor:
- Jan Bělohoubek, Simona Fornůsek, František Kovář, Tomáš Luňák, David Pokorný, Tomáš Rabas, Ivana Trummová
- Supervisor:
- Department of Information Security
- Synopsis:
-
The goal of the course is to provide students with the introduction of basic concepts in modern approach to cybersecurity. Students will get a basic overview of threats in cyberspace and attacker techniques, security mechanisms in networks, operating systems and applications, as well as of basic cyberspace regulations.
- Requirements:
-
Entry knowledge is not required.
- Syllabus of lectures:
-
1. Introduction, definition of cybersecurity and basic concepts.
2. Threat modeling, adversarial profile, threat intelligence.
3. Cybercrime and its economics.
4. Cyberrisk management.
5. Protocols in cyber security.
6. Network security.
7. Operating systems security, security aspects of operating system level virtualization.
8. Web and mobile security.
9. Security development lifecycle, introduction to concepts of application security.
10. Cyberphysical systems, Internet of Things.
11. Critical infrastructure, industrial control systems
12. Cybersecurity and privacy.
13. Law and regulations in cyberspace.
- Syllabus of tutorials:
-
1. Threat Modelling, Data Flow Diagrams, Threat Modelling assignment
2. Risk management concepts
3. Attacks on network layer
4. Web application attacks
5. Privacy considerations, privacy domains, practical privacy analysis
- Study Objective:
- Study materials:
-
1. Anderson R. : Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2008. ISBN 978-0-470-06852-6.
2. Wheeler E. : Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Syngress, 2011. ISBN 978-1597496155.
3. Stallings W. : Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional, 2018. ISBN 978-0134772806.
4. Adnress J. : Foundations of Information Security. No Starch Press, 2019. ISBN 978-1718500044.
5. Cunningham Ch. : Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare. Packt Publishing, 2020. ISBN 978-1839216992.
- Note:
- Time-table for winter semester 2024/2025:
- Time-table is not available yet
- Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Bachelor specialization, Computer Engineering, 2021 (elective course)
- Bachelor specialization, Information Security, 2021 (PS)
- Bachelor specialization, Software Engineering, 2021 (elective course)
- Bachelor specialization, Computer Science, 2021 (elective course)
- Bachelor specialization, Computer Networks and Internet, 2021 (VO)
- Bachelor specialization Computer Systems and Virtualization, 2021 (elective course)