Course: null

» List of faculties » EF » KIN
Course title -
Course code KIN/PB
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements Course does not contain work placement
Recommended optional programme components None
  • Podaras Athanasios, Ing. Ph.D.
  • Dostál Michal, Ing.
Course content
Lectures: 1. Why, how, what and against whom to provide; static and dynamic security methods. 2. Protection of stored data - Physical separation from the environment, archiving of media, methods of recovering damaged data (carrier damage, data structure damage). 3. Protection of received / transmitted data - firewalls, tunnels. 4. Encryption, mathematical foundations of cryptography, symmetric cipher, asymmetric cipher, hash, electronic signature. 5. Secure socket layer, certificates, certification authority. 6. IP tunneling, IP forwarding, virtual networks. 7. Secure Login - ssh, sftp, scp, kerberos, and ticket service in general (Third Party Third Party Security). 8. Antivirus protection - virus classification, defense methods. 9. Typical methods of penetration into closed systems, denial of service, spamming, hammering. 10. Securing shared data spaces. Seminars: 1. Introduction to the SALIX-Linux multiuser system, basic rules for working in UNIX. Application of damaged data recovery methods - self-repair codes, redundant totals. 2. Creating a simple virtual network within the classroom, setting up virtual network interfaces. 3. Application of hashing methods in practice - generation of certificates, electronic signatures. 4. Central Authentication Management - LDAP, Kerberos, SASL. Creating a secure shared data space. 5. Presentation of semestral projects.

Learning activities and teaching methods
Learning outcomes
The subject acquaints students with the basic problems of logical and physical data security, both deposited in the depositories and transmitted via the networks. Students will be introduced to the latest trends and technologies in data security. The seminars focus on practical application of lectured theoretical issues.


Assessment methods and criteria
Credit requirements: Successful presentation of semestral project. Examination: Oral examination covering the topics discussed during the lectures
Recommended literature
  • AUMASSON, J. - P. a M. D. GREEN. Serious cryptography: a practical introduction to modern encryption.. San Francisco: No Starch Press, 2017. ISBN 978-1-59327-826-7.
  • DAIMI, K. Computer and network security essentials. New York: Springer Science Business Media, 2017. ISBN 978-3319584232.
  • DOSTÁLEK, L. a kol. Velký průvodce protokoly TCP/IP: Bezpečnost. Brno: Computer Press, 2006.
  • LOCKHART, A. Network Security Hacks 100 Industrial-Strength Tips & Tools.. Sebastopol: O' Reilly Media, 2004. ISBN 0-596-00643-8.
  • NORTHCUTT, S. Bezpečnost počítačových sítí.. Brno: Computer Press, 2006. ISBN 80-251-0697-7.
  • STALLINGS, W. Cryptography and network security: principles and practice. Boston: Pearson, 2017. ISBN 978-0134444284.
  • STALLINGS, W. Network security essentials: applications and standards.. Boston: Pearson, 2017. ISBN 978-0134527338.
  • THOMAS, T. M. Network Security First-Step.. Indianapolis: Cisco Press, 2011. ISBN 978-1-58720-411-1.
  • TOXEN, B. Bezpečnost v Linuxu. Brno: Computer Press, 2003. ISBN 80-7226-716-7.

Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester