Course code |
Course title |
Extent of teaching
|
Completion
|
Semester
|
Credits
|
Guarantor |
Instructors |
MI-KRY |
Advanced Cryptology |
2P+1C |
Z,ZK |
Z |
4 |
|
|
MI-KRY.16 |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
5 |
|
|
NIE-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
NI-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Lórencz R. |
NI-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
5 |
Lórencz R. |
Jureček M. |
NIE-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
5 |
Jureček M., Lórencz R. |
Jureček M. |
BIE-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
5 |
|
|
BIK-TAB.21 |
Applications of Security in Technology |
14KP+4KC |
Z,ZK |
L |
5 |
|
|
BI-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Pozděna M. |
BI-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
BIE-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J., Trofimova Y. |
BIK-ASB.21 |
Applied Network Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
BIE-ZSB.21 |
Basics of System Security |
2P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Fornůsek S., Svetlík M. |
BIK-ZSB.21 |
Basics of System Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Dostál J., Svetlík M. |
Svetlík M. |
BI-ZSB.21 |
Basics of System Security |
2P+2C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Novák D., Svetlík M. |
NIE-BLO |
Blockchain |
1P+2C |
Z,ZK |
Z |
5 |
Lórencz R. |
Bielik M., Gattermayer J., Lórencz R., Růžička J. |
NI-CTF |
Capture The Flag |
3C |
KZ |
Z |
4 |
Dostál J. |
Dostál J., Trummová I., Šutovský M. |
BIE-KAB.21 |
Cryptography and Security |
2P+2C |
Z,ZK |
L |
5 |
Lórencz R. |
Lórencz R. |
BI-KAB.21 |
Cryptography and Security |
2P+2C |
Z,ZK |
L |
5 |
Lórencz R. |
Lórencz R. |
BIK-KAB.21 |
Cryptography and Security |
14KP+4KC |
Z,ZK |
L |
5 |
Lórencz R. |
Dostál J., Lórencz R. |
MI-KYB.16 |
Cybernality |
2P |
ZK |
Z |
5 |
|
|
NI-KYB |
Cybernality |
2P |
ZK |
Z |
5 |
|
|
BIE-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Kiezler T., Kolárik M. |
BI-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J. |
BI-EHA |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
5 |
|
|
BIK-EHA.21 |
Ethical Hacking |
14KP+4KC |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Kiezler T., Kolárik M. |
BIE-HWB.21 |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
Buček J. |
Buček J., Kodýtek F. |
BIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
|
|
BI-HWB.21 |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
Buček J. |
Buček J. |
BI-HWB |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
|
|
BIK-HWB.21 |
Hardware Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Buček J. |
Buček J. |
BIK-HWB |
Hardware Security |
14KP+4KC |
Z,ZK |
Z |
5 |
|
|
MI-HWB.16 |
Hardware Security |
2P+2C |
Z,ZK |
L |
5 |
|
|
NIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
5 |
Buček J. |
Buček J. |
NI-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
5 |
Buček J. |
Buček J., Lórencz R. |
BI-HAS |
Human Aspects in Cryptography and Security |
2P+1C |
Z,ZK |
Z |
5 |
Trummová I. |
Trummová I. |
BIE-HAS |
Human Factors in Cryptography and Security |
2P+1C |
Z,ZK |
Z |
5 |
Trummová I. |
Trummová I. |
MI-IBE |
Information Security |
2P |
ZK |
Z |
2 |
|
|
NI-IBE |
Information Security |
2P |
ZK |
Z |
2 |
|
|
BIE-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Bělohoubek J., Pokorný D., Trummová I. |
BIK-UKB.21 |
Introduction to Cybersecurity |
21KP+2KC |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Tetera J. |
BI-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
5 |
Bělohoubek J. |
Luňák T., Pokorný D., Trummová I. |
MI-MKY.16 |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
5 |
|
|
NIE-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
5 |
Lórencz R. |
Jureček M., Lórencz R. |
NI-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
5 |
Lórencz R. |
Jureček M. |
NI-HCM |
Mind Hacking |
2P+1C |
ZK |
Z |
5 |
Holý J., Jiřina M. |
Holý J., Jiřina M. |
MI-SIB.16 |
Network Security |
2P+1C |
Z,ZK |
L |
5 |
|
|
NIE-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
5 |
Fornůsek S. |
Fornůsek S. |
NI-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
5 |
Dostál J. |
Dostál J., Šutovský M. |
MI-REV.16 |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
5 |
|
|
NIE-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
5 |
Kokeš J. |
Kokeš J. |
NI-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
5 |
Kokeš J. |
Kokeš J. |
BI-BEK.21 |
Secure Code |
2P+2C |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
BI-BEK |
Secure Code |
2P+2C |
Z,ZK |
L |
5 |
|
|
BIE-BEK.21 |
Secure Code |
2P+2C |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
BIK-BEK.21 |
Secure Code |
14KP+4KC |
Z,ZK |
L |
5 |
Kokeš J. |
Kokeš J. |
BIK-BEK |
Secure Code |
14KP+4KC |
Z,ZK |
L |
5 |
|
|
BI-BEZ |
Security |
2P+2C |
Z,ZK |
L |
6 |
|
|
BIE-BEZ |
Security |
2P+1R+1C |
Z,ZK |
L |
6 |
|
|
BIK-BEZ |
Security |
13KP+4KC |
Z,ZK |
L |
6 |
|
|
BIE-SSB |
System and Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
BIK-SSB |
System and Network Security |
14KP+4KC |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
BI-SSB |
System and Network Security |
2P+2C |
Z,ZK |
Z |
5 |
Dostál J. |
Dostál J. |
NIE-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
5 |
Fornůsek S. |
Fornůsek S., Svetlík M., Zahradnický T. |
NI-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
5 |
Lórencz R. |
Fornůsek S., Svetlík M. |
MI-SYB.16 |
System Security |
2P+2C |
Z,ZK |
L |
5 |
|
|
|