|
Lecturer(s)
|
-
Dostal Martin, Ing. Ph.D.
|
|
Course content
|
1. Introduction to cybersecurity, safety vs. security, basic concepts, and organizational context. 2. - 4. Threats, risks, and security processes in organizations - risk management, incident response, business continuity. 5. - 6. Regulatory and legal frameworks - GDPR, NIS2, Cybersecurity Act. 7. - 10. Technical measures and secure IT systems - server security, programming, integration with organizational processes. 11. - 13. Roles and responsibilities in cybersecurity, case studies, and ethical aspects.
|
|
Learning activities and teaching methods
|
- Preparation for an examination (30-60)
- 38 hours per semester
- Individual project (40)
- 40 hours per semester
- Contact hours
- 52 hours per semester
|
| prerequisite |
|---|
| Knowledge |
|---|
| describe the basic principles of how information systems and computer networks operate |
| explain fundamental IT concepts (server, client, database, network services, cloud) |
| understand the basic principles of operating systems and their role in IT infrastructure |
| understand fundamental concepts of information security (confidentiality, integrity, availability) |
| have a basic overview of software development and its life cycle |
| Skills |
|---|
| work with common IT tools and environments |
| navigation in technical documentation and understand specialized texts in Czech or English |
| analyze a simple IT problem and describe its basic technical context |
| work independently as well as collaboratively in a team to solve assigned tasks |
| structure information and present the results of one's work in written or oral form |
| Competences |
|---|
| N/A |
| N/A |
| learning outcomes |
|---|
| Knowledge |
|---|
| the basic principles of cybersecurity in the context of modern IT systems and organizations |
| the main types of threats, vulnerabilities, and risks in the field of cybersecurity |
| basic security processes in organizations (risk management, incident response, business continuity) |
| key legislative and regulatory frameworks in cybersecurity (GDPR, NIS2, the Cybersecurity Act) |
| the roles, responsibilities, and competencies of key stakeholders in cybersecurity (CISO, DPO, project manager, IT manager) |
| the ethical and societal aspects of cybersecurity |
| Skills |
|---|
| analyze the basic security posture of an organization and identify key assets, threats, and risks |
| assess the suitability of technical, organizational, and process-based security measures in a specific context |
| interpret basic legislative and regulatory requirements and reflect them in the design of security measures |
| describe and justify a cybersecurity solution proposal in a structured manner |
| communicate security-related topics with both technical and non-technical roles within an organization |
| Competences |
|---|
| N/A |
| N/A |
| teaching methods |
|---|
| Knowledge |
|---|
| Lecture with visual aids |
| Lecture supplemented with a discussion |
| Skills |
|---|
| Lecture with visual aids |
| Lecture supplemented with a discussion |
| Competences |
|---|
| Lecture with visual aids |
| assessment methods |
|---|
| Knowledge |
|---|
| Written exam |
| Seminar work |
| Skills |
|---|
| Written exam |
| Seminar work |
| Competences |
|---|
| Seminar work |
|
Recommended literature
|
-
EU. GDPR - Regulation (EU) 2016/679. .
-
EU. NIS2 Directive (EU) 2022/2555. .
-
Whitman, M. E., & Mattord, H. J. Principles of Information Security. 2022. ISBN 9780357506431.
-
William Stallings. Effective Cybersecurity: A Guide to Using Best Practices and Standards. 2019. ISBN 9780134772806.
|