FI:PV297 Cybersecurity Training - Course Information
PV297 Cybersecurity Training
Faculty of InformaticsSpring 2025
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
In-person direct teaching - Teacher(s)
- doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer) - Guaranteed by
- doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Prerequisites (in Czech)
- ( PB177 Cyber Attacks || ( PB156 Computer Networks && PV004 UNIX ) ) && ! PV276 Seminar on Cyber Attacks
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 15 student(s).
Current registration and enrolment status: enrolled: 0/15, only registered: 15/15, only registered with preference (fields directly associated with the programme): 15/15 - fields of study / plans the course is directly associated with
- Cybersecurity (programme FI, B-CS)
- Cybersecurity management (programme FI, N-RSSS)
- Course objectives
- Introduce students to various forms of education in cybersecurity - raising awareness, technical and communication skills training, and exercises. Practice creating educational materials including pilot testing with users.
- Learning outcomes
- Upon completion of the course, students should be able to:
- describe various forms of cybersecurity education and explain the differences between them,
- design and implement a chosen form of education - either a game for teaching technical skills or an exercise for organizational response to a cybersecurity incident,
- evaluate the pilot run of the designed game or exercise.
- Syllabus
- Types of cybersecurity education: raising awareness, technical and communication skills training. Examples of each type.
- Environment and tools for implementing cybersecurity education.
- Lifecycle of exercises. Phases of preparation, testing, delivery, and evaluation.
- Design and preparation of exercises in teams. Ongoing consultations.
- Internal testing of the created exercise by students of the course.
- Pilot testing of the created exercise by peers, and the general public.
- Methods of exercise evaluation, formulation of improvement suggestions.
- Literature
- FIRST CSIRT Services Framework. https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1
- Methods for Designing Educational Cybersecurity Games. https://is.muni.cz/auth/th/uovmy/
- Teaching methods
- Lecture, seminar, and semestral team project with several milestones.
- Assessment methods
- Continuous assessment of the semestral project. Delivery of a created exercise at the end of the semester. Incorporation of feedback from exercise participants.
- Language of instruction
- Czech
- Further comments (probably available only in Czech)
- The course is taught annually.
The course is taught: every week. - Teacher's information
- Course materials and assignments are mainly in English but the course is taught in Czech. Possible topics for the created exercises: exploiting and mitigating a recently discovered vulnerability in widely used open-source software, securing a specific application exposed to the Internet, practicing incident handling processes.
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/fi/spring2025/PV297