Course title | Cybersecurity and Cryptography |
---|---|
Course code | NTI/KAS |
Organizational form of instruction | Lecture + Lesson |
Level of course | Master |
Year of study | not specified |
Semester | Winter |
Number of ECTS credits | 5 |
Language of instruction | Czech |
Status of course | Compulsory |
Form of instruction | Face-to-face |
Work placements | Course does not contain work placement |
Recommended optional programme components | None |
Lecturer(s) |
---|
|
Course content |
Topics of lectures and exercises: - Cryptography repetorium. Symmetric and asymmetric cryptosystems. Hashing, key generators and Diffie-Hellman functions. Cryptographic variables. - Electronic signature, electronic signature generation and verification. Certificates, PKI, legal aspects. - Transmission systems. Security in application, transport, network and link layer. Electronic mail security, IKE, DNSsec, TLS, SSH, IPSec, MACsec, WPA. TOR network. - Access systems. Authentication, protocols BAA, DAA, EAP, Kerberos. Authorization protocols Oauth, RADIUS. - Payment systems. 3Dsecure protocol. Payment cards. Cryptocurrencies, Bitcoin. - Definition of cybersecurity concepts. Risk, asset, vulnerability. Threat, security event, incident, attack, crime. Legislative, organizational, technical measures. - Physical security, access control, protection of systems and infrastructure. - LAN protection, interface protection. Firewalls, proxy servers, application security. - Legislative aspects. Existing legal standards and their development. Law on cyber security. Definition of cybercrime. - Identification of cybercrime. Botnet, Malware, Ransomware, Scam, Phishing, theft of intellectual property. DoS, Ddos and other attacks. Identity Theft.
|
Learning activities and teaching methods |
Monological explanation (lecture, presentation,briefing), Dialogue metods(conversation,discussion,brainstorming)
|
Learning outcomes |
The course introduces students to practical applications of cryptography and the principles of cyber security. Cryptographic functions and protocols and their implemaentation are the core of the cryptography part of the courese. The complex field of cybersecurity is introducet from various points of view - technical, oraganisational and the legal one.
Students will acquire the basic concepts algorithm development and realization for data transferring, coding, and ciphering |
Prerequisites |
Unspecified
|
Assessment methods and criteria |
Combined examination, Written exam
- |
Recommended literature |
|
Study plans that include the course |
Faculty | Study plan (Version) | Category of Branch/Specialization | Recommended semester | |
---|---|---|---|---|
Faculty: Faculty of Mechatronics, Informatics and Interdisciplinary Studies | Study plan (Version): Information Technology (2013) | Category: Informatics courses | 1 | Recommended year of study:1, Recommended semester: Winter |