Main page | Study Branches | Groups of Courses | All Courses | Roles | Explanatory Notes               Instructions
A | C | D | E | H | I | M | N | O | P | R | S | U | W
A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The list presented here is sorted by departments, within departments alphabetically by the Course title. The departments are listed alphabetically by the Department code.

Courses


18104 Department of Computer Systems
Course code Course title Extent of teaching
Completion
Semester
Credits
Guarantor Instructors
MI-POA Advanced Computer System Architectures 2+1 Z,ZK L 4
MI-POA.16 Advanced Computer System Architectures 2+1 Z,ZK L 5 Tvrdík P. Kašpar J., Tvrdík P.
MIE-POA Advanced Computer System Architectures 2+1 Z,ZK L 4
MIE-POA.16 Advanced Computer System Architectures 2+1 Z,ZK L 5 Tvrdík P. Kašpar J., Tvrdík P.
MIE-KRY Advanced Cryptology 2+2 Z,ZK Z 4
MIE-KRY.16 Advanced Cryptology 2+2 Z,ZK Z 5 Lórencz R. Lórencz R.
MI-KRY Advanced Cryptology 2+2 Z,ZK Z 4
MI-KRY.16 Advanced Cryptology 2+2 Z,ZK Z 5 Lórencz R. Lórencz R.
BI-APS Architecture of Computer Systems 2+2 Z,ZK Z 6
BIK-APS Architecture of Computer Systems 13+4 Z,ZK Z 6
BI-APS.1 Architectures of Computer Systems 2+2 Z,ZK Z 5 Lórencz R. Lórencz R.
BIE-APS.1 Architectures of Computer Systems 2+2 Z,ZK Z 5 Lórencz R. Buček J., Lórencz R.
BIK-APS.1 Architectures of Computer Systems 14+4 Z,ZK Z 5 Lórencz R. Buček J., Dostál J., Lórencz R.
BIE-PSI Computer Networks 2+2 Z,ZK L 5 Smotlacha V. Kubalík P., Moucha A., Smítka J.
BIK-PSI Computer Networks 13+4 Z,ZK L 5 Smotlacha V. Černý V., Kubalík P., Smítka J., Smotlacha V.
BI-PSI Computer Networks 2+2 Z,ZK L 5 Smotlacha V. Smotlacha V.
MIE-KYB.1 Cybernality 2+0 ZK Z 3
MI-KYB.1 Cybernality 2+0 ZK Z 3
MI-KYB Cybernality 2+0 ZK Z 4
MI-KYB.16 Cybernality 2+0 ZK Z 5 Kolouch J. Kolouch J.
MI-DSV Distributed Systems and Computing 2+1 Z,ZK Z 4
MI-DSV.16 Distributed Systems and Computing 2+1 Z,ZK Z 5 Janeček J. Janeček J.
MIE-DSV Distributed Systems and Computing 2+1 Z,ZK Z 4
MIE-DSV.16 Distributed Systems and Computing 2+1 Z,ZK Z 5 Janeček J. Janeček J.
MI-SCA Embedded Microcontrollers in Smartcards: Efficient Implementations and Side-Channel Attacks 2+2 KZ L 3
BI-EHA Ethical Hacking 2+2 Z,ZK L 5 Růžička J. Růžička J.
BIE-HWB Hardware Security 2+2 Z,ZK Z 5 Lórencz R. Buček J., Lórencz R.
BI-HWB Hardware Security 2+2 Z,ZK Z 5 Lórencz R. Buček J., Lórencz R.
BIK-HWB Hardware Security 14+4 Z,ZK Z 5 Lórencz R. Buček J., Lórencz R.
MIE-HWB.16 Hardware Security 2+2 Z,ZK L 5 Lórencz R. Buček J., Lórencz R.
MI-HWB.16 Hardware Security 2+2 Z,ZK L 5 Lórencz R. Buček J., Lórencz R.
MIE-IBE Information Security 2+0 ZK Z 2 Čermák I. Čermák I.
MI-IBE Information Security 2+0 ZK Z 2 Čermák I. Čermák I.
MI-IOT Internet of Things 2+1 Z,ZK L 4 Janeček J. Janeček J.
BI-UDZ Introduction to Audio Digitization 2+0 ZK Z 2
BI-ULI Introduction to Linux 0 Z Z 2 Muzikář Z. Muzikář Z.
BIK-UOS Introduction to Operating System UNIX 13+4 KZ Z 5
BI-UOS Introduction to Operating System UNIX 2+2 KZ Z 5
BI-SOJ Machine Oriented Languages 2+2 Z,ZK L 4
MIE-MTI Modern Internet Technologies 2+1 Z,ZK Z 4
MIE-MTI.16 Modern Internet Technologies 2+1 Z,ZK Z 5 Moucha A. Moucha A.
MI-MTI Modern Internet Technologies 2+1 Z,ZK Z 4
MI-MTI.16 Modern Internet Technologies 2+1 Z,ZK Z 5 Moucha A. Moucha A.
MI-MCS Multicore Systems 1+2 KZ Z 4 Tvrdík P. Kašpar J.
MI-MAI Multimedia and Internet 2+1 Z,ZK L 3 Ubik S. Ubik S.
BI-ADS Network Administration 2+2 Z,ZK Z 5 Smítka J. Smítka J.
BIK-ADS Network Administration 13+4 Z,ZK Z 5 Smítka J. Smítka J.
MIE-SIB Network Security 2+1 Z,ZK Z 4
MIE-SIB.16 Network Security 2+1 Z,ZK Z 5 Blažek R. Buchovecká S., Čejka T.
MI-SIB Network Security 2+1 Z,ZK Z 4
MI-SIB.16 Network Security 2+1 Z,ZK Z 5 Blažek R. Čejka T.
BIE-ST1 Network Technology 1 0+2 Z Z 3 Moucha A. Moucha A.
BI-ST1 Network Technology 1 0+2 Z Z 3 Moucha A. Černý V., Igliar R.
FI-ST1 Network Technology 1 Z Z 3
BI-ST2 Network Technology 2 0+3 Z L 3 Moucha A. Igliar R., Moucha A.
FI-ST2 Network Technology 2 0+4 Z L 4
BI-ST3 Network Technology 3 0+2 Z Z 3 Moucha A. Moucha A.
BI-ST4 Network Technology 4 0+2 Z L 3
BIE-OSY Operating Systems 2+1 Z,ZK L 5 Trdlička J. Trdlička J.
BIK-OSY Operating Systems 13+4 Z,ZK L 5 Šoch M. Šoch M., Trdlička J.
BI-OSY Operating Systems 2+2 Z,ZK L 5 Trdlička J. Trdlička J.
MIE-PPR.2 Parallel Programming 0+1 Z Z 2 Šoch M. Šoch M.
MI-PPR.2 Parallel Programming 0+1 Z Z 2 Šoch M. Šimeček I., Šoch M., Tvrdík P.
MIE-PAR.2 Parallel Algorithms and Systems 2+3 ZK Z 6 Tvrdík P. Tvrdík P.
MI-PAR.1 Parallel Algorithms and Systems 2+3 Z,ZK Z 8
MI-PAR Parallel Algorithms and Systems 2+3 Z,ZK Z 6
MI-PAR.2 Parallel Algorithms and Systems 2+2 ZK Z 6 Tvrdík P. Tvrdík P.
MIE-PDP.16 Parallel and Distributed Programming 2+2 Z,ZK L 5 Tvrdík P. Tvrdík P.
MI-PDP.16 Parallel and Distributed Programming 2+2 Z,ZK L 5 Tvrdík P. Tvrdík P.
MIE-PAP Parallel Computer Architectures 2+1 Z,ZK L 4
MIE-PAP.16 Parallel Computer Architectures 2+1 Z,ZK L 5 Šimeček I. Šimeček I.
MI-PAP Parallel Computer Architectures 2+1 Z,ZK L 4
MI-PAP.16 Parallel Computer Architectures 2+1 Z,ZK L 5 Šimeček I. Šimeček I.
MI-PRC Programming in CUDA 2+1 Z,ZK L 4 Šimeček I. Šimeček I.
BIE-PS1 Programming in Shell 1 2+2 KZ Z 5 Trdlička J. Trdlička J.
BIK-PS1 Programming in Shell 1 13+4 KZ Z 5 Čermák I. Čermák I.
BI-PS1 Programming in Shell 1 2+2 KZ Z 5 Muzikář Z. Muzikář Z., Trdlička J.
BIK-PS2 Programming in shell 2 13+2 Z,ZK L 4 Žďárek J. Žďárek J., Bařinka L.
BI-PS2 Programming in shell 2 2+2 Z,ZK L 4 Žďárek J. Žďárek J., Bařinka L.
MIE-REV.16 Reverse Engineering 1+2 Z,ZK Z 5 Lórencz R. Kokeš J.
MI-REV.16 Reverse Engineering 1+2 Z,ZK Z 5 Kokeš J. Kokeš J.
MI-REV Reverse Engineering 1+2 Z,ZK L 3
MI-RRI Risk Management in Informatics 2+0 ZK L 3 Blažek Z. Blažek Z.
BIK-SKJ Scripting Languages 13+2 Z,ZK L 4
BI-SKJ Scripting Languages 2+2 Z,ZK L 4
BI-BEK Secure Code 2+2 Z,ZK L 5 Kokeš J. Kokeš J.
BIE-BEK Secure Code 2+2 Z,ZK L 5 Kokeš J. Kokeš J.
BIK-BEK Secure Code 14+4 Z,ZK L 5 Kokeš J. Kokeš J.
MI-BHW Security and Hardware 2+2 Z,ZK L 4
MIE-BHW Security and Hardware 2+1 Z,ZK L 4
MI-BPR Security and Secure Programming 2+1 Z,ZK Z 4
MI-BPR.16 Security and Secure Programming 2+1 Z,ZK Z 5 Lórencz R. Kokeš J.
MIE-BPR Security and Secure Programming 2+1 Z,ZK Z 4
BI-BEZ Security 2+2 Z,ZK L 6 Lórencz R. Buček J., Lórencz R.
BIE-BEZ Security 2+2 Z,ZK L 6 Lórencz R. Buček J., Hlaváč J., Lórencz R., Zahradnický T.
BIK-BEZ Security 13+4 Z,ZK L 6 Lórencz R. Buček J., Dostál J., Hlaváč J., Lórencz R., Zahradnický T.
BI-SM Shell Minimum 0 Z Z 2 Žďárek J. Žďárek J.
BIK-STO Storage and Filesystems 13+4 Z,ZK L,Z 4 Kašpar J. Kašpar J.
BI-STO Storage and Filesystems 2+2 Z,ZK L,Z 4 Kašpar J. Kašpar J.
BIE-SSB System and Network Security 2+2 Z,ZK Z 5 Moucha A. Moucha A., Smítka J.
BIK-SSB System and Network Security 14+4 Z,ZK Z 5 Moucha A. Smítka J.
BI-SSB System and Network Security 2+2 Z,ZK Z 5 Moucha A. Moucha A., Smítka J.
MIE-SYB.16 System Security 2+2 Z,ZK L 5 Lórencz R. Lórencz R.
MI-SYB.16 System Security 2+2 Z,ZK L 5 Lórencz R. Buček J., Kašpar J., Lórencz R., Prágl M.
BI-ADU Unix Administration 2+2 Z,ZK L 6
BI-ADU.1 Unix Administration 2+2 Z,ZK L 5 Muzikář Z. Žďárek J., Muzikář Z.
BIE-ADU.1 Unix Administration 2+2 Z,ZK L 5 Muzikář Z. Žďárek J., Muzikář Z.
BIK-ADU.1 Unix Administration 14+4 Z,ZK L 5 Muzikář Z. Žďárek J., Muzikář Z.
BIK-ADU Unix Internals and Administration 13+4 Z,ZK L 6
BI-ADW Windows Administration 2+1 Z,ZK L 5
BI-ADW.1 Windows Administration 2+1 Z,ZK Z 4 Prágl M. Prágl M.
BIE-ADW.1 Windows Administration 2+1 Z,ZK Z 4 Prágl M. Prágl M.
BIK-ADW.1 Windows Administration 14+2 Z,ZK Z 4 Prágl M. Kašpar J., Prágl M.
BIK-ADW Windows Administration 13+2 Z,ZK L 5
MI-BPS Wireless Computer Networks 2+1 Z,ZK L 4 Moucha A. Moucha A.
MIE-BPS Wireless Computer Networks 2+1 Z,ZK L 4 Černý V., Moucha A. Černý V., Moucha A.


Page updated 19. 11. 2017, semester: Z,L/2016-7, Z,L/2017-8, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška