Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles               Instructions
A | B | C | E | H | I | M | N | R | S
A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The list presented here is sorted by departments, within departments alphabetically by the Course title. The departments are listed alphabetically by the Department code.

Courses


18106 Department of Information Security
Course code Course title Extent of teaching
Completion
Semester
Credits
Guarantor Instructors
MI-KRY Advanced Cryptology 2P+1C Z,ZK Z 4
MI-KRY.16 Advanced Cryptology 2P+2C Z,ZK Z 5
NIE-KRY Advanced Cryptology 2P+2C Z,ZK Z 5 Lórencz R. Lórencz R.
NI-KRY Advanced Cryptology 2P+2C Z,ZK Z 5 Lórencz R. Lórencz R.
NI-AIB Algorithms of Information Security 2P+1C Z,ZK Z 5 Lórencz R. Jureček M.
NIE-AIB Algorithms of Information Security 2P+1C Z,ZK Z 5 Jureček M., Lórencz R. Jureček M.
BIE-TAB.21 Applications of Security in Technology 2P+2C Z,ZK L 5
BIK-TAB.21 Applications of Security in Technology 14KP+4KC Z,ZK L 5
BI-TAB.21 Applications of Security in Technology 2P+2C Z,ZK L 5 Dostál J. Dostál J., Pozděna M.
BI-ASB.21 Applied Network Security 2P+2C Z,ZK Z 5 Dostál J. Dostál J.
BIE-ASB.21 Applied Network Security 2P+2C Z,ZK Z 5 Dostál J. Dostál J., Trofimova Y.
BIK-ASB.21 Applied Network Security 14KP+4KC Z,ZK Z 5 Dostál J. Dostál J.
BIE-ZSB.21 Basics of System Security 2P+2C Z,ZK Z 5 Lórencz R. Fornůsek S., Svetlík M.
BIK-ZSB.21 Basics of System Security 14KP+4KC Z,ZK Z 5 Dostál J., Svetlík M. Svetlík M.
BI-ZSB.21 Basics of System Security 2P+2C Z,ZK Z 5 Fornůsek S. Novák D., Svetlík M.
NIE-BLO Blockchain 1P+2C Z,ZK Z 5 Lórencz R. Bielik M., Gattermayer J., Lórencz R., Růžička J.
NI-CTF Capture The Flag 3C KZ Z 4 Dostál J. Dostál J., Trummová I., Šutovský M.
BIE-KAB.21 Cryptography and Security 2P+2C Z,ZK L 5 Lórencz R. Lórencz R.
BI-KAB.21 Cryptography and Security 2P+2C Z,ZK L 5 Lórencz R. Lórencz R.
BIK-KAB.21 Cryptography and Security 14KP+4KC Z,ZK L 5 Lórencz R. Dostál J., Lórencz R.
MI-KYB.16 Cybernality 2P ZK Z 5
NI-KYB Cybernality 2P ZK Z 5
BIE-EHA.21 Ethical Hacking 2P+2C Z,ZK L 5 Dostál J. Dostál J., Kiezler T., Kolárik M.
BI-EHA.21 Ethical Hacking 2P+2C Z,ZK L 5 Dostál J. Dostál J.
BI-EHA Ethical Hacking 2P+2C Z,ZK L 5
BIK-EHA.21 Ethical Hacking 14KP+4KC Z,ZK L 5 Dostál J. Dostál J., Kiezler T., Kolárik M.
BIE-HWB.21 Hardware Security 2P+2C Z,ZK Z 5 Buček J. Buček J., Kodýtek F.
BIE-HWB Hardware Security 2P+2C Z,ZK Z 5
BI-HWB.21 Hardware Security 2P+2C Z,ZK Z 5 Buček J. Buček J.
BI-HWB Hardware Security 2P+2C Z,ZK Z 5
BIK-HWB.21 Hardware Security 14KP+4KC Z,ZK Z 5 Buček J. Buček J.
BIK-HWB Hardware Security 14KP+4KC Z,ZK Z 5
MI-HWB.16 Hardware Security 2P+2C Z,ZK L 5
NIE-HWB Hardware Security 2P+2C Z,ZK L 5 Buček J. Buček J.
NI-HWB Hardware Security 2P+2C Z,ZK L 5 Buček J. Buček J., Lórencz R.
BI-HAS Human Aspects in Cryptography and Security 2P+1C Z,ZK Z 5 Trummová I. Trummová I.
BIE-HAS Human Factors in Cryptography and Security 2P+1C Z,ZK Z 5 Trummová I. Trummová I.
MI-IBE Information Security 2P ZK Z 2
NI-IBE Information Security 2P ZK Z 2
BIE-UKB.21 Introduction to Cybersecurity 3P+1C Z,ZK Z 5 Bělohoubek J. Bělohoubek J., Pokorný D., Trummová I.
BIK-UKB.21 Introduction to Cybersecurity 21KP+2KC Z,ZK Z 5 Bělohoubek J. Tetera J.
BI-UKB.21 Introduction to Cybersecurity 3P+1C Z,ZK Z 5 Bělohoubek J. Luňák T., Pokorný D., Trummová I.
MI-MKY.16 Mathematics for Cryptology 3P+1C Z,ZK L 5
NIE-MKY Mathematics for Cryptology 3P+1C Z,ZK L 5 Lórencz R. Jureček M., Lórencz R.
NI-MKY Mathematics for Cryptology 3P+1C Z,ZK L 5 Lórencz R. Jureček M.
NI-HCM Mind Hacking 2P+1C ZK Z 5 Holý J., Jiřina M. Holý J., Jiřina M.
MI-SIB.16 Network Security 2P+1C Z,ZK L 5
NIE-SIB Network Security 2P+1C Z,ZK L 5 Fornůsek S. Fornůsek S.
NI-SIB Network Security 2P+1C Z,ZK L 5 Dostál J. Dostál J., Šutovský M.
MI-REV.16 Reverse Engineering 1P+2C Z,ZK Z 5
NIE-REV Reverse Engineering 1P+2C Z,ZK Z 5 Kokeš J. Kokeš J.
NI-REV Reverse Engineering 1P+2C Z,ZK Z 5 Kokeš J. Kokeš J.
BI-BEK.21 Secure Code 2P+2C Z,ZK L 5 Kokeš J. Kokeš J.
BI-BEK Secure Code 2P+2C Z,ZK L 5
BIE-BEK.21 Secure Code 2P+2C Z,ZK L 5 Kokeš J. Kokeš J.
BIK-BEK.21 Secure Code 14KP+4KC Z,ZK L 5 Kokeš J. Kokeš J.
BIK-BEK Secure Code 14KP+4KC Z,ZK L 5
BI-BEZ Security 2P+2C Z,ZK L 6
BIE-BEZ Security 2P+1R+1C Z,ZK L 6
BIK-BEZ Security 13KP+4KC Z,ZK L 6
BIE-SSB System and Network Security 2P+2C Z,ZK Z 5 Dostál J. Dostál J.
BIK-SSB System and Network Security 14KP+4KC Z,ZK Z 5 Dostál J. Dostál J.
BI-SSB System and Network Security 2P+2C Z,ZK Z 5 Dostál J. Dostál J.
NIE-SBF System Security and Forensics 2P+1C Z,ZK Z 5 Fornůsek S. Fornůsek S., Svetlík M., Zahradnický T.
NI-SBF System Security and Forensics 2P+1C Z,ZK Z 5 Lórencz R. Fornůsek S., Svetlík M.
MI-SYB.16 System Security 2P+2C Z,ZK L 5


Page updated 21. 11. 2024, semester: L/2024-5, Z,L/2021-2, L/2020-1, L/2023-4, Z/2024-5, Z/2022-3, L/2019-20, L/2022-3, Z/2020-1, Z/2019-20, Z/2023-4, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška