| Course code |
Course title |
Extent of teaching
|
Completion
|
Semester
|
Credits
|
Guarantor |
Instructors |
| NIE-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
| NI-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
| NI-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
5 |
Jureček M. |
Jureček M. |
| NIE-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
5 |
Jureček M. |
Jureček M. |
| BIE-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Bělohoubek J., Pozděna M., Skórski M. |
| BIK-TAB.21 |
Applications of Security in Technology |
14KP+4KC |
Z,ZK |
L |
5 |
|
|
| BI-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Bělohoubek J., Dostál J., Pozděna M. |
| BI-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
| BIE-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J., Trofimova Y. |
| BIK-ASB.21 |
Applied Network Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
| BIE-ZSB.21 |
Basics of System Security |
2P+2C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Fornůsek S., Svetlík M. |
| BIK-ZSB.21 |
Basics of System Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Too many persons |
Svetlík M. |
| BI-ZSB.21 |
Basics of System Security |
2P+2C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Novák D., Svetlík M. |
| NIE-BLO |
Blockchain |
1P+2C |
Z,ZK |
Z |
5 |
Gattermayer J. |
Bielik M., Gattermayer J., Růžička J. |
| NI-CTF |
Capture The Flag |
3C |
KZ |
Z |
4 |
Dostál J. |
Dostál J., Trummová I., Šutovský M. |
| BIE-KAB.21 |
Cryptography and Security |
2P+2C |
Z,ZK |
L |
5 |
Lórencz R. |
Lórencz R. |
| BI-KAB.21 |
Cryptography and Security |
2P+2C |
Z,ZK |
L |
5 |
Lórencz R. |
Buček J., Lórencz R. |
| BIK-KAB.21 |
Cryptography and Security |
14KP+4KC |
Z,ZK |
L |
5 |
Lórencz R. |
Buček J., Dostál J., Lórencz R. |
| QNI-KKP |
Cryptology and Quantum Computing |
2P+2C |
Z,ZK |
Z |
6 |
|
|
| NI-KYB |
Cybernality |
2P |
ZK |
Z |
5 |
|
|
| BIE-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Šimko A., Kolárik M. |
| BI-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Šimko A., Kolárik M. |
| BIK-EHA.21 |
Ethical Hacking |
14KP+4KC |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Šimko A., Kolárik M. |
| BIE-HWB.21 |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
Buček J. |
Buček J. |
| BI-HWB.21 |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
Buček J. |
Buček J. |
| BIK-HWB.21 |
Hardware Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Buček J. |
Buček J. |
| BIK-HWB |
Hardware Security |
14KP+4KC |
Z,ZK |
Z |
5 |
|
|
| NIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
5 |
Buček J. |
Buček J. |
| NI-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
5 |
Buček J. |
Buček J. |
| BI-HAS |
Human Aspects in Cryptography and Security |
2P+1C |
Z,ZK |
Z |
5 |
Trummová I. |
Trummová I. |
| BIE-HAS |
Human Factors in Cryptography and Security |
2P+1C |
Z,ZK |
Z |
5 |
Trummová I. |
Trummová I. |
| NI-IBE |
Information Security |
2P |
ZK |
Z |
2 |
|
|
| UNI-IB |
Information security |
2P+2C |
Z,ZK |
L |
5 |
|
|
| BIE-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Bělohoubek J., Pokorný D., Trummová I. |
| BIK-UKB.21 |
Introduction to Cybersecurity |
21KP+2KC |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Tetera J. |
| BI-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Luňák T., Pokorný D., Trummová I. |
| NIE-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
5 |
Lórencz R. |
Jureček M., Lórencz R. |
| NI-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
5 |
Lórencz R. |
Jureček M. |
| NI-HCM |
Mind Hacking |
2P+1C |
ZK |
Z |
5 |
Jiřina M. |
Holý J., Jiřina M. |
| NIE-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
5 |
Fornůsek S. |
Dostál J., Fornůsek S., Zahradnický T. |
| NI-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Šutovský M. |
| NIE-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
5 |
Kokeš J. |
Kokeš J. |
| NI-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
5 |
Kokeš J. |
Kokeš J. |
| BI-BEK.21 |
Secure Code |
2P+2C |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
| BIE-BEK.21 |
Secure Code |
2P+2C |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
| BIK-BEK.21 |
Secure Code |
14KP+4KC |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
| NIE-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Fornůsek S., Svetlík M., Zahradnický T. |
| NI-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Fornůsek S., Svetlík M. |
|