PA211 Cybersecurity Operations

Faculty of Informatics
Spring 2025
Extent and Intensity
1/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching
Teacher(s)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
Bc. Adam Chovanec (seminar tutor)
Guaranteed by
doc. Ing. Pavel Čeleda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PB177 Cyber Attacks || PV276 Seminar on Cyber Attacks
The course is offered only to master students.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 60 student(s).
Current registration and enrolment status: enrolled: 0/60, only registered: 56/60, only registered with preference (fields directly associated with the programme): 26/60
fields of study / plans the course is directly associated with
there are 8 fields of study the course is directly associated with, display
Course objectives
The general objective of the course is to introduce topics of cybersecurity operations in an organization. The course covers specific knowledge and skills required for the work role of Cyber Defense Infrastructure Support Specialist (PR-INF-001), Systems Security Analyst (OM-ANA-001), and Vulnerability Assessment Analyst (PR-VAM-001) as defined by the NICE Cybersecurity Workforce Framework (see https://niccs.cisa.gov/workforce-development/cyber-security-workforce-framework/).
Learning outcomes
At the end of the course, a student should be able to:
conduct vulnerability scans and recognize vulnerabilities in systems and applications,
conduct authorized penetration testing on enterprise network and applications,
apply selected countermeasures to harden (secure) networks, operating systems, and applications.
Syllabus
  • Asset management.
  • Vulnerability management.
  • Threat management.
  • Penetration testing – introduction, process, report and presentation.
  • Hardening of operating system, and applications.
Literature
  • J. Muniz, G. McIntyre, and N. AlFardan, Security Operations Center: Building, Operating, and Maintaining Your SOC. Cisco Press, 2015.
  • The Center for Internet Security. CIS Benchmarks, 2022. https://www.cisecurity.org/cis-benchmarks/ • NIST. National Checklist Program (NCP), 2022. https://ncp.nist.gov/repository
  • OWASP. OWASP Web Security Testing Guide, 2022. https://owasp.org/www-project-web-security-testing-guide/
  • TEVAULT, Donald A. Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats. Packt Publishing Ltd, 2020.
Teaching methods
Lectures, weekly seminars, homework assignments during the semester.
Assessment methods
Assignments during the semester (60 %), practical exam (40 %).
Language of instruction
English
Further comments (probably available only in Czech)
The course is taught annually.
The course is taught: every week.
Teacher's information
The course will be taught in Spring semesters only.
The course is also listed under the following terms Spring 2016, Spring 2017, Spring 2018, Spring 2019, Autumn 2022, Spring 2023, Spring 2024.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/fi/spring2025/PA211