Course: Security Technologies

« Back
Course title Security Technologies
Course code KI/BET
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study 3
Semester Winter
Number of ECTS credits 2
Language of instruction Czech
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Krejčí Jan, RNDr. Ph.D.
  • Maškov Viktor, doc. RNDr. Mgr. DrSc.
Course content
1. Information security - basic axioms, principles, classification, tools. 2. Information security management systems - services, methods, verification of security 3. Analysis of the threats and risks - assets, threats, vulnerabilities, risks, threats, countermeasures. 4 Contemporary threats of information technologies - types, techniques, options. 5 AAA framework - principles, classification, purpose, use. 6 Infrastructure PKI - basic axioms, dig. signature, hash functions, use. 7 Infrastructure PKI - dig. certificate, certificate authority. 8 Computer security - basic defensive / protective technologies, techniques, tools and methods. 9 Data security - the life cycle of data, data distribution, backup and deletion of data. 10 Principles of security and protection of data in a computer network (in the Internet). 11. Protocols and methods of security and of safety data in a computer network (in the Internet). 12. Data protection of wireless networks - principles, classification, use.

Learning activities and teaching methods
unspecified
Learning outcomes
The course is designed as a basic introduction to the security field of information technology with an emphasis on basic concepts, methods, principles and techniques used in specific areas. Subject describes the system management data security, the types of analyzes and appropriate countermeasures. It analyzes different types and principles of threats, the most common defense / protection technologies including a general description of the basic methods of protecting data and information on the level of network and computer itself. Subject explains the certification process and the principles of eGovernment including a quality standards of information security management .

Prerequisites
Fundamentals of computer networks, encryption and management of operating systems.
KI/DEP

Assessment methods and criteria
unspecified
Active participation in seminars (min. 80%), seminar work in the range of 15 standard pages (15x1800 characters).
Recommended literature
  • Bitto O. Jak zabezpečit domácí a malou síť Windows XP. Computer Press, Praha, 2006. ISBN 80-251-1098-0.
  • Dostálek L., Vohnoutová M. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Computer Press, Praha, 2010. ISBN 978-80-251-2619-6.
  • Král M. Bezpečnost domácího počítače. Grada Publishing, Praha, 2006. ISBN 80-247-1408-6.
  • Lidinský V., Švarcová I., Budiš P., Loebl Z., Procházková B. eGovernment bezpečně. Grada Publishing, Praha, 2008. ISBN 978-80-247-2462-1.
  • Northcutt S. Bezpečnost počítačových sítí. Computer Press, Praha, 2005. ISBN 80-251-0697-7.
  • Pužmanová R. Bezpečnost bezdrátové komunikace. Computer Press, Praha, 2005. ISBN 80-251-0791-4.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Science Study plan (Version): Information Systems (A14) Category: Informatics courses 3 Recommended year of study:3, Recommended semester: Winter