Course: Security Technologies

» List of faculties » PRF » KI
Course title Security Technologies
Course code KI/BTE
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study not specified
Semester Winter
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Krejčí Jan, RNDr. Ph.D.
Course content
unspecified

Learning activities and teaching methods
unspecified
Learning outcomes
Prerequisites
unspecified
KI/ZKB and KI/KZKB

Assessment methods and criteria
unspecified
Recommended literature
  • Broad, J., Bindner, A. Hacking with Kali: practical penetration testing techniques. Waltham, MA: Syngress, 2014. ISBN 978-0-12-407749-2.
  • Diogenes, Y., Ozkaya, E. Cybersecurity ? attack and defense strategies: infrastructure security with Red Team and Blue Team tactics. Birmingham: Packt, 2018. ISBN 978-1-78847-529-7.
  • Forshaw, J. Attacking network protocols: a hacker's guide to capture, analysis, and exploitation. San Francisco: No Starch Press, 2018. ISBN 978-1-59327-750-5.
  • Glenny, M. Temný trh: kyberzloději, kyberpolicisté a vy. Praha: Argo, 2013. Zip (31). ISBN 978-80-7363-522-0.
  • Hoopes, J. Virtualization for Security, Including Sandboxng, Disaster Recovery, High Availability, Forensic Analysis, and Honepotting. SYNGRESS, 2009, ISBN 978-1-59749-305-5.
  • Kolouch, J. CyberCrime. Praha: CZ.NIC, z.s.p.o., 2016. CZ.NIC, 14. publikace. ISBN 978-80-88168-15-7.
  • Lehto, M., Neittaanmäki, P., ed. Cyber security: analytics, technology and automation. Cham: Springer, 2015. Intelligent systems, control and automation: science and engineering, Volume 78. ISBN 978-3-319-18301-5.
  • Maisner, M., Vlachová, B. Zákon o kybernetické bezpečnosti: komentář. Praha: Wolters Kluwer, 2015. Komentáře Wolters Kluwer. ISBN 978-80-7478-817-8.
  • Orebaugh, A. Wireshark a Ethereal: kompletní průvodce analýzou a diagnostikou sítí. Brno: Computer Press, 2008. ISBN 978-80-251-2048-4.
  • Sanders C. Analýza sítí a řešení problémů v programu Wireshark. Computer Press, 2012. ISBN 978-80-251-3718-5.
  • Stallings, W. Cryptography and network security: principles and practice. Seventh edition. Boston: Pearson, 2017. Global edition. ISBN 978-1-292-15858-7.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester