Course code |
Course title |
Extent of teaching
|
Completion
|
Semester
|
Credits
|
Guarantor |
Instructors |
MIE-KRY |
Advanced Cryptology |
2+2 |
Z,ZK |
Z |
4 |
|
|
MIE-KRY.16 |
Advanced Cryptology |
2+2 |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
MI-KRY |
Advanced Cryptology |
2+2 |
Z,ZK |
Z |
4 |
|
|
MI-KRY.16 |
Advanced Cryptology |
2+2 |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
MIE-KYB.1 |
Cybernality |
2+0 |
ZK |
Z |
3 |
|
|
MIE-KYB.16 |
Cybernality |
2+0 |
ZK |
Z |
5 |
Kolouch J. |
Kolouch J. |
MI-KYB.1 |
Cybernality |
2+0 |
ZK |
Z |
3 |
|
|
MI-KYB.16 |
Cybernality |
2+0 |
ZK |
Z |
5 |
Kolouch J. |
Kolouch J. |
BI-EHA |
Ethical Hacking |
2+2 |
Z,ZK |
L |
5 |
Růžička J. |
Dostál J., Kuběna J., Růžička J. |
BIE-HWB |
Hardware Security |
2+2 |
Z,ZK |
Z |
5 |
Lórencz R. |
Buček J., Kodýtek F., Lórencz R. |
BI-HWB |
Hardware Security |
2+2 |
Z,ZK |
Z |
5 |
Lórencz R. |
Buček J., Lórencz R. |
BIK-HWB |
Hardware Security |
14+4 |
Z,ZK |
Z |
5 |
Lórencz R. |
Buček J., Lórencz R. |
MIE-HWB.16 |
Hardware Security |
2+2 |
Z,ZK |
L |
5 |
Lórencz R. |
Buček J., Lórencz R. |
MI-HWB.16 |
Hardware Security |
2+2 |
Z,ZK |
L |
5 |
Lórencz R. |
Buček J., Lórencz R. |
MIE-IBE |
Information Security |
2+0 |
ZK |
Z |
2 |
Čermák I. |
Čermák I. |
MI-IBE |
Information Security |
2+0 |
ZK |
Z |
2 |
Čermák I. |
Čermák I. |
MIE-SIB |
Network Security |
2+1 |
Z,ZK |
Z |
4 |
|
|
MIE-SIB.16 |
Network Security |
2+1 |
Z,ZK |
Z |
5 |
Buchovecká S. |
Buchovecká S., Čejka T. |
MI-SIB |
Network Security |
2+1 |
Z,ZK |
Z |
4 |
|
|
MI-SIB.16 |
Network Security |
2+1 |
Z,ZK |
Z |
5 |
Čejka T. |
Buchovecká S., Čejka T. |
MIE-REV.16 |
Reverse Engineering |
1+2 |
Z,ZK |
Z |
5 |
Lórencz R. |
Kokeš J. |
MI-REV.16 |
Reverse Engineering |
1+2 |
Z,ZK |
Z |
5 |
Kokeš J. |
Kokeš J. |
MI-REV |
Reverse Engineering |
1+2 |
Z,ZK |
L |
3 |
|
|
BI-BEK |
Secure Code |
2+2 |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
BIE-BEK |
Secure Code |
2+2 |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
BIK-BEK |
Secure Code |
14+4 |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
MIE-BHW |
Security and Hardware |
2+1 |
Z,ZK |
L |
4 |
|
|
BI-BEZ |
Security |
2+2 |
Z,ZK |
L |
6 |
Lórencz R. |
Buček J., Lórencz R. |
BIE-BEZ |
Security |
2+2 |
Z,ZK |
L |
6 |
Lórencz R. |
Buček J., Lórencz R. |
BIK-BEZ |
Security |
13+4 |
Z,ZK |
L |
6 |
Lórencz R. |
Dostál J., Lórencz R. |
BIE-SSB |
System and Network Security |
2+2 |
Z,ZK |
Z |
5 |
|
|
BIK-SSB |
System and Network Security |
14+4 |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J., Smítka J. |
BI-SSB |
System and Network Security |
2+2 |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
MIE-SYB.16 |
System Security |
2+2 |
Z,ZK |
L |
5 |
Lórencz R. |
Buchovecká S., Lórencz R. |
MI-SYB.16 |
System Security |
2+2 |
Z,ZK |
L |
5 |
Lórencz R. |
Buček J., Buchovecká S., Lórencz R. |
|