PV017 Information Technology Security
Faculty of InformaticsAutumn 2024
- Extent and Intensity
- 1/0/0. 1 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching - Teacher(s)
- Mgr. Kamil Malinka, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 23. 9. to Mon 16. 12. each odd Monday 12:00–13:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course, students should be able
design a simple information security policy,
assess the adjusted level of information security guaranty,
justify security measures and controls and
explain information security issues to the management of an organisation. - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security for a small organization.
- Syllabus
- Concepts, definitions.
- Anatomy of information security.
- Standardization process and basics of relevant legislation.
- Information security management in an organization.
- Risk management.
- Information security policy.
- Information security management system, ISMS, ISMS project.
- Selected aspects of audit and computer security evaluation.
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam - midterm and final.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2023
- Extent and Intensity
- 1/0/0. 1 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
Mgr. Kamil Malinka, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 19. 9. to Tue 12. 12. each even Tuesday 8:00–9:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 83 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course, students should be able
design a simple information security policy,
undertake a simple risk assessment,
assess the adjusted level of information security guaranty,
justify security measures and controls and
explain information security issues to the management of an organisation. - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security for a small organization.
- Syllabus
- Concepts, definitions.
- Anatomy of information security.
- Standardization process and basics of relevant legislation.
- Information security management in an organization.
- Risk management.
- Information security policy.
- Information security management system, ISMS, ISMS project.
- Selected aspects of audit and computer security evaluation.
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam - midterm and final.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2022
- Extent and Intensity
- 1/0/0. 1 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
Mgr. Kamil Malinka, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Thu 15. 9. to Thu 8. 12. each odd Thursday 10:00–11:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 83 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course, students should be able
design a simple information security policy,
undertake a simple risk assessment,
assess the adjusted level of information security guaranty,
justify security measures and controls and
explain information security issues to the management of an organisation. - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security for a small organization.
- Syllabus
- Concepts, definitions.
- Anatomy of information security.
- Standardization process and basics of relevant legislation.
- Information security management in an organization.
- Risk management.
- Information security policy.
- Information security management system, ISMS, ISMS project.
- Selected aspects of audit and computer security evaluation.
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam - midterm and final.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2021
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- Mgr. Kamil Malinka, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 15. 9. to Wed 8. 12. Wed 14:00–15:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 82 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security
- Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- On-line exam in IS MU, midterm and final
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Teacher's information
- https://www.fi.muni.cz/usr/staudek/vyuka/security/PV017.xhtml
PV017 Information Technology Security
Faculty of InformaticsAutumn 2020
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
Mgr. Kamil Malinka, Ph.D. (assistant)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (assistant) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 Virtuální místnost
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 82 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security
- Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- On-line exam in IS MU, midterm and final
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Teacher's information
- https://www.fi.muni.cz/usr/staudek/vyuka/security/PV017.xhtml
PV017 Information Technology Security
Faculty of InformaticsAutumn 2019
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
Mgr. Kamil Malinka, Ph.D. (assistant)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (assistant) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 D3
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 82 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security
- Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2018
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
Mgr. Kamil Malinka, Ph.D. (assistant)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 45 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security
- Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2017
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 45 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Learning outcomes
- Students completing this course will be able to fulfill the role of manager of information security
- Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2016
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 8:00–9:50 D2
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 45 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2015
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 10:00–11:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 45 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2014
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 17:00–18:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 44 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2013
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 12:00–13:50 D3
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 44 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy,
elaborate risk analysis,
assess adjusted level of information security guaranty,
justify measurements and controls options and
explain information security issues on the level of management of institution - Syllabus
- Concepts, definitions
- Anatomy of information security
- Standardization process
- Information security management in an organization
- Steering response to security incidents
- Risk management
- Information security policy
- Information security management system, ISMS, ISMS project
- Measurement and digital evidence
- Audit and evaluation of information security
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2012
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 16:00–17:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 44 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy
elaborate risk analysis
assess adjusted level of information security guaranty
justify measurements and controls options
explain information security issues on the level of management of institution - Syllabus
- Information security notions and concepts
- Standardization
- Information Security Basics
- Security policy, risk analysis
- Evaluation of Security, Common Criteria, ISO/IEC 15408
- ISO/IEC 27000, Information Security Management System
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2011
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 16:00–17:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 44 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy
elaborate risk analysis
assess adjusted level of information security guaranty
justify measurements and controls options
explain information security issues on the level of management of institution - Syllabus
- Information security notions and concepts
- Standardization
- Information Security Basics
- Security policy, risk analysis
- Evaluation of Security, Common Criteria, ISO/IEC 15408
- ISO/IEC 27000, Information Security Management System
- Literature
- recommended literature
- CALDER, Alan and Steve WATKINS. IT governance : a manager's guide to data security and ISO 27001 / ISO 27002. 4th ed. Philadelphia: Kogan Page, 2008, x, 372. ISBN 9780749452711. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2010
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 17:00–18:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 43 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy
elaborate risk analysis
assess adjusted level of information security guaranty
justify measurements and controls options
explain information security issues on the level of management of institution - Syllabus
- Information security notions and concepts
- Standardization
- Information Security Basics
- Security policy, risk analysis
- Evaluation of Security, Common Criteria, ISO/IEC 15408
- ISO/IEC 27000, Information Security Management System
- Open Web Application Security Project, evaluation, certification
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2009
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 16:00–17:50 D1
- Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 41 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able
evolve information security policy
elaborate risk analysis
assess adjusted level of information security guaranty
justify measurements and controls options
explain information security issues on the level of management of institution - Syllabus
- Information security notions and concepts
- Standardization
- Information Security Basics
- Security policy, risk analysis
- Evaluation of Security, Common Criteria, ISO/IEC 15408
- ISO/IEC 27000, Information Security Management System
- Open Web Application Security Project, evaluation, certification
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Teaching methods
- lectures
- Assessment methods
- Written exam
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2008
- Extent and Intensity
- 0/0/2. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: z (credit).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Prerequisites
- PV080 course should be passed before this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 34 fields of study the course is directly associated with, display
- Course objectives
- This course aims to provide the necessary knowledge base for a manager responsible for security of certain information technology tools.
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Security standards
- Security evaluation criteria
- Digital signatures, trust, PKI
- Session (communication) security (SSL, SSH, IPsec, WEP, WPA)
- E-mail security
- Identification systems
- Network payment systems
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods
- Written exam.
- Language of instruction
- Czech
- Follow-Up Courses
- Further comments (probably available only in Czech)
- The course is taught annually.
Note related to how often the course is taught: PS 2008 - samostudium, konzultace. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2007
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 10:00–11:50 D3
- Prerequisites
- PV080 course should be passed before this course. PV079 is suitable, too.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- This course aims to provide the necessary knowledge base for a manager responsible for security of certain information technology tools.
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Security standards
- Security evaluation criteria
- Digital signatures, trust, PKI
- Session (communication) security (SSL, SSH, IPsec, WEP, WPA)
- E-mail security
- Identification systems
- Network payment systems
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2006
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 8:00–9:50 D3
- Prerequisites
- PV080 course should be passed before this course. PV079 is suitable, too.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course aims to provide the necessary knowledge base for a manager responsible for security of certain information technology tools.
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Security standards
- Security evaluation criteria
- Digital signatures, trust, PKI
- Session (communication) security (SSL, SSH, IPsec, WEP, WPA)
- E-mail security
- Identification systems
- Network payment systems
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2005
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 8:00–9:50 D3
- Prerequisites
- ! P017 IT Securtiy
Computer systems architecture, operating systems architecture - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- Security, security policy, security enforcing functions, security mechanisms, disaster recovery planning, conventional encryption, symetric/asymetric cryptography, digital signatures, identifiction and authentication, access control, security evaluation criteria, viruses, security standards
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Disaster recovery planning.
- Conventional encryption.
- Block/stream ciphers, symetric/asymetric cryptography, DES, 3DES, ECB, CBC, OFB, CFB, RSA, ElGamal, DSS, digital signatures
- Identifiction and authentication
- Access control
- Security evaluation criteria
- Biometrics
- Viruses
- PKI
- Security Standards
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2004
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 8:00–9:50 D1
- Prerequisites
- ! P017 IT Securtiy
Computer systems architecture, operating systems architecture - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- Security, security policy, security enforcing functions, security mechanisms, disaster recovery planning, conventional encryption, symetric/asymetric cryptography, digital signatures, identifiction and authentication, access control, security evaluation criteria, viruses, security standards
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Disaster recovery planning.
- Conventional encryption.
- Block/stream ciphers, symetric/asymetric cryptography, DES, 3DES, ECB, CBC, OFB, CFB, RSA, ElGamal, DSS, digital signatures
- Identifiction and authentication
- Access control
- Security evaluation criteria
- Biometrics
- Viruses
- PKI
- Security Standards
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2003
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 14:00–15:50 VD182
- Prerequisites (in Czech)
- ! P017 IT Securtiy
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 8 fields of study the course is directly associated with, display
- Course objectives (in Czech)
- Předmět poskytne základní znalosti o bezpečnosti IT, o analýze rizik o tvorbě havarijních plánů, o principech kryptografie, o správě kryptografie, o vybraných bezpečnostních funkcích, o kritériích hodnocení bezpečnosti a o normách bezpečnosti IT.
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Disaster recovery planning.
- Conventional encryption.
- Block/stream ciphers, symetric/asymetric cryptography, DES, 3DES, ECB, CBC, OFB, CFB, RSA, ElGamal, DSS, digital signatures
- Identifiction and authentication
- Access control
- Security evaluation criteria
- Biometrics
- Viruses
- PKI
- Security Standards
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV017 Information Technology Security
Faculty of InformaticsAutumn 2002
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Jan Staudek, CSc. (lecturer)
- Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc. - Timetable
- Wed 12:00–13:50 D1
- Prerequisites (in Czech)
- ! P017 IT Securtiy
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 8 fields of study the course is directly associated with, display
- Course objectives (in Czech)
- Předmět poskytne základní znalosti o bezpečnosti IT, o analýze rizik o tvorbě havarijních plánů, o principech kryptografie, o správě kryptografie, o vybraných bezpečnostních funkcích, o kritériích hodnocení bezpečnosti a o normách bezpečnosti IT.
- Syllabus
- Security, security policy, security enforcing functions, security mechanisms.
- Disaster recovery planning.
- Conventional encryption.
- Block/stream ciphers, symetric/asymetric cryptography, DES, 3DES, ECB, CBC, OFB, CFB, RSA, ElGamal, DSS, digital signatures
- Identifiction and authentication
- Access control
- Security evaluation criteria
- Biometrics
- Viruses
- PKI
- Security Standards
- Literature
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- přednáška, písemná zkouška
- Language of instruction
- Czech
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (recent)