FI:PA168 IT security and cryptography - Course Information
PA168 Postgraduate seminar on IT security and cryptography
Faculty of InformaticsAutumn 2020
- Extent and Intensity
- 0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 16:00–17:50 C525
- Prerequisites
- SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Image Processing and Analysis (programme FI, N-VIZ)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Bioinformatics (programme FI, N-AP)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Information Systems (programme FI, N-IN)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, D-IN4)
- Information Security (programme FI, N-PSKB_A)
- Quantum and Other Nonclassical Computational Models (programme FI, N-TEI)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Networks and Communications (programme FI, N-PSKB)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems (programme FI, N-IN)
- Principles of programming languages (programme FI, N-TEI)
- Embedded Systems (eng.) (programme FI, N-IN)
- Embedded Systems (programme FI, N-IN)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Computer Games Development (programme FI, N-VIZ)
- Processing and analysis of large-scale data (programme FI, N-UIZD)
- Image Processing (programme FI, N-AP)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks. - Learning outcomes
- Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks. - Syllabus
- The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
- Literature
- http://portal.acm.org/dl.cfm
- http://www2.computer.org/portal/web/csdl
- Teaching methods
- presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
- Assessment methods
- 3 presentations and discussions of those
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught each semester.
- Enrolment Statistics (Autumn 2020, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2020/PA168