Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
BIE-LA2.21 |
Linear Algebra 2 |
2P+2C |
Z,ZK |
L |
2 |
5 |
Forough M., Klouda K. |
18105 |
BIE-PPA |
Programming Paradigms |
2P+2C |
Z,ZK |
Z |
3 |
5 |
|
18101 |
BIE-TJV.21 |
Java Technology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Rozinek O. |
18102 |
BIE-ZRS.21 |
Basics of System Control |
2P+2C |
Z,ZK |
Z,L |
3 |
5 |
Hyniová K. |
18103 |
BIE-JPO |
Computer Units |
2P+2C |
Z,ZK |
Z |
3 |
5 |
|
18103 |
BIE-TPS.21 |
Computer Networks Technologies |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Smotlacha V. |
18104 |
BIE-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
3 |
5 |
Bělohoubek J., Pokorný D., Trummová I. |
18106 |
BIE-AG2 |
Algorithms and Graphs 2 |
2P+2C |
Z,ZK |
L |
4 |
5 |
|
18101 |
BIE-PJP |
Programming Languages and Compilers |
2P+1C |
Z,ZK |
L |
4 |
5 |
|
18101 |
BIE-SWI.21 |
Software Engineering |
2P+1C |
Z,ZK |
L |
4 |
5 |
Rybola Z. |
18102 |
BIE-SP1.21 |
Team Software Project 1 |
4C |
KZ |
L |
4 |
5 |
|
18102 |
BIE-VES |
Embedded Systems |
2P+2C |
Z,ZK |
L |
4 |
5 |
|
18103 |
BIE-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
4 |
5 |
Dostál J., Kiezler T., Kolárik M. |
18106 |
BIE-BEK |
Secure Code |
2P+2C |
Z,ZK |
L |
4 |
5 |
|
18106 |
BIE-OOP.21 |
Object-Oriented Programming |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Křikava F., Máj P. |
18101 |
BIE-KOM |
Conceptual Modelling |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Pergl R. |
18102 |
BIE-SP2.21 |
Team Software Project 2 |
2C |
KZ |
Z |
5 |
5 |
|
18102 |
BIE-MPP.21 |
Methods of interfacing peripheral devices |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Skrbek M. |
18103 |
BIE-PNO |
Practical Digital Design |
2P+2C |
KZ |
Z |
5 |
5 |
Novotný M. |
18103 |
BIE-SRC.21 |
Real-time systems |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Kubátová H., Vyskočil J. |
18103 |
BIE-IOT.21 |
Internet of Things |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Černý V., Janeček J. |
18104 |
BIE-SIP.21 |
Network Programming |
2P+2C |
Z |
Z |
5 |
5 |
Fesl J. |
18104 |
BIE-LOG.21 |
Mathematical Logic |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Trlifajová K. |
18105 |
BIE-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Dostál J., Trofimova Y. |
18106 |
BIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Buček J., Kodýtek F., Lórencz R. |
18106 |
BIE-ZUM.21 |
Artificial Intelligence Fundamentals |
2P+2C |
Z,ZK |
L |
6 |
5 |
Surynek P. |
18105 |
BIE-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
6 |
5 |
Dostál J. |
18106 |
|