FPF:UIINFNP007 Information and Cyber Sec. II - Course Information
UIINFNP007 Information and Cyber Security II
Faculty of Philosophy and Science in OpavaSummer 2025
- Extent and Intensity
- 2/0/0. 4 credit(s). Type of Completion: zk (examination).
- Teacher(s)
- Ing. Vladimír Lazecký (lecturer)
- Guaranteed by
- Ing. Vladimír Lazecký
Institute of Computer Science – Faculty of Philosophy and Science in Opava - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FPF, INFOR-nav)
- Course objectives
- We continue the course "Information and Cyber Security I". This follow-up course focuses on issues of personal security in cyberspace, the recognition of security incidents, the work of security teams and the security of information systems in large-scale networks.
- Learning outcomes
- After completing the course the student will be able to:
- identify and summarize important features of digital identity;
- identify issues related to personal security in cyberspace;
-describe security incidents in cyberspace; - Syllabus
- 1. Cyberspace, specifics of problem solving in cyberspace.
- 2. Digital identity: definition, digital identity for public administration, digital identity in cyberspace, behavioral analysis for digital identity, anonymization, risks and threats from provided digital risks and risks of digital identity.
- 3. Personal security: social networks, global web services, profiling, psychometrics, prediction, deployment AI systems, big data, risks, defense options.
- 4. Security incidents: classification of security incidents, incidents against confidentiality, availability and integrity information, sociotechnical, technical incidents, defence options.
- 5. Legal regulations in the Czech Republic and EU countries, technical standards and best practices, certification standards. Meaning and limits of legislation.
- 6. Surveillance centres. SIEM/ISMS systems, log management, secure information flow management. Security teams at state and national level, security teams of large organizations, CERT, CSIRT, CIRC. Legal framework operation of security teams and coordination of their cooperation.
- 7. Cybersecurity: security aspects of information systems over large network infrastructure, security aspects of protecting state assets.
- Literature
- required literature
- CCNA Cybersecurity Operations Companion Guide. Indianapolis, IN: Pearson Education, Cisco Press, 2018. ISBN 978-1-58713-439-5.
- Zákon č. 181/2014 Sb.: Zákon o kybernetické bezpečnosti a o změně souvisejících zákonů. Praha, 2014. Dostupné také na: https://www.zakonyprolidi.cz/cs/2014-181.
- recommended literature
- MOORE, Robert. Cybercrime: Investigating High-Technology Computer Crime. 2nd edition. London, New York: Routledge, 2015. ISBN 9781317522973.
- SINGER, P. W. a Allan FRIEDMAN. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, c2014. ISBN 978-0-19-991809-6.
- EVANS, Lester. Cybersecurity: What You Need to Know about Computer and Cyber Security, Social Engineering, the Internet of Things + an Essential Guide to Ethical Hacking for Beginners. Amazon Digital Services LLC - Kdp Print Us, 2019. ISBN 9781794647237.
- CORDERO, Pedro D. Hacking the Cyber Threat a Cybersecurity Primer for Law-Enforcement Leaders and Executives. CreateSpace Independent Publishing Platform, 2017. ISBN 9781976048517.
- Teaching methods
- lectures, class discussion, group projects, presentations by professionals
- Assessment methods
- Active participation in the class, preparation of the final project according to the teacher's instructions
- Language of instruction
- Czech
- Enrolment Statistics (Summer 2025, recent)
- Permalink: https://is.slu.cz/course/fpf/summer2025/UIINFNP007