PV276 Seminar on Simulation of Cyber Attacks

Faculty of Informatics
Autumn 2022
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
Mgr. Daniela Belajová (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Jan Vykopal, Ph.D.
Timetable
Thu 10:00–11:50 S108, except Thu 22. 9., except Thu 13. 10., except Thu 24. 11. ; and Thu 22. 9. 10:00–11:50 B311, Thu 13. 10. 10:00–11:50 B311, Thu 24. 11. 10:00–11:50 B311
Prerequisites (in Czech)
( PB156 Computer Networks && PV004 UNIX ) || SOUHLAS
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 18 student(s).
Current registration and enrolment status: enrolled: 5/18, only registered: 1/18, only registered with preference (fields directly associated with the programme): 1/18
fields of study / plans the course is directly associated with
there are 36 fields of study the course is directly associated with, display
Course objectives
The course enables students to learn cybersecurity topics practically. Students will learn standard attack techniques as well as detection and prevention methods in a simulated environment of KYPO cyber range. These skills will be exercised in the preparation of a cybersecurity game, which the student teams will present at a public event.
Learning outcomes
At the end of the course, students will be able to:
    • understand current cybersecurity threats,
    • conduct penetration testing using suitable tools,
    • apply suitable methods of detection and prevention of vulnerabilities,
    • create a virtual environment with selected vulnerabilities of computer systems and applications,
    • create a cybersecurity game in KYPO cyber range.
Syllabus
  • The course has two parts.
  • The first part introduces selected topics of cybersecurity, including attack types and techniques, network traffic analysis, forensic analysis, and prevention methods.
  • In the second part, teams of students prepare cybersecurity games at KYPO cyber range.
  • The created games are publicly presented at the end of the semester.
Literature
  • Mike O’Leary. 2019. Cyber Operations: Building, Defending, and Attacking Modern Computer Networks (2nd ed.). Apress, USA.
Teaching methods
Hands-on seminars, homework assignments, and a team project (cybersecurity game). Public presentation at the end of the semester.
Assessment methods
Homework assignments (at least 50 % of all marks). Team project and its presentation.
Language of instruction
Czech
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
Teacher's information
The course is taught in the KYPO laboratory with 18 desktop computers. Students enrolled above this number must bring their own laptops.
The course is also listed under the following terms Autumn 2019, Spring 2020, Autumn 2020, Spring 2022, Spring 2023, Autumn 2023, Spring 2024.
  • Enrolment Statistics (Autumn 2022, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2022/PV276