FI:PA211 Cybersecurity Operations - Course Information
PA211 Cybersecurity Operations
Faculty of InformaticsSpring 2025
- Extent and Intensity
- 1/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching - Teacher(s)
- doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
Bc. Adam Chovanec (seminar tutor) - Guaranteed by
- doc. Ing. Pavel Čeleda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Prerequisites
- PB177 Cyber Attacks || PV276 Seminar on Cyber Attacks
The course is offered only to master students. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 25 student(s).
Current registration and enrolment status: enrolled: 0/25, only registered: 0/25, only registered with preference (fields directly associated with the programme): 0/25 - fields of study / plans the course is directly associated with
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Discrete algorithms and models (programme FI, N-TEI)
- Information security (programme FI, N-PSKB)
- Information Security (programme FI, N-PSKB_A)
- Deployment and operations of software systems (programme FI, N-SWE)
- Computer Networks and Communications (programme FI, N-PSKB)
- Cybersecurity management (programme FI, N-RSSS)
- Course objectives
- The general objective of the course is to introduce topics of cybersecurity operations in an organization. The course covers specific knowledge and skills required for the work role of Cyber Defense Infrastructure Support Specialist (PR-INF-001), Systems Security Analyst (OM-ANA-001), and Vulnerability Assessment Analyst (PR-VAM-001) as defined by the NICE Cybersecurity Workforce Framework (see https://niccs.cisa.gov/workforce-development/cyber-security-workforce-framework/).
- Learning outcomes
- At the end of the course, a student should be able to:
conduct vulnerability scans and recognize vulnerabilities in systems and applications,
conduct authorized penetration testing on enterprise network and applications,
apply selected countermeasures to harden (secure) networks, operating systems, and applications. - Syllabus
- Asset management.
- Vulnerability management.
- Threat management.
- Penetration testing – introduction, process, report and presentation.
- Hardening of operating system, and applications.
- Literature
- J. Muniz, G. McIntyre, and N. AlFardan, Security Operations Center: Building, Operating, and Maintaining Your SOC. Cisco Press, 2015.
- The Center for Internet Security. CIS Benchmarks, 2022. https://www.cisecurity.org/cis-benchmarks/ • NIST. National Checklist Program (NCP), 2022. https://ncp.nist.gov/repository
- OWASP. OWASP Web Security Testing Guide, 2022. https://owasp.org/www-project-web-security-testing-guide/
- TEVAULT, Donald A. Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats. Packt Publishing Ltd, 2020.
- Teaching methods
- Lectures, weekly seminars, homework assignments during the semester.
- Assessment methods
- Assignments during the semester (60 %), practical exam (40 %).
- Language of instruction
- English
- Further comments (probably available only in Czech)
- The course is taught annually.
The course is taught: every week. - Teacher's information
- The course will be taught in Spring semesters only.
- Enrolment Statistics (Spring 2025, recent)
- Permalink: https://is.muni.cz/course/fi/spring2025/PA211