Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
BIE-IDO.21 |
Introduction to DevOps |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Rybola Z., Vondra T. |
18102 |
BIE-TJV.21 |
Java Technology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Rozinek O. |
18102 |
BIE-ZRS.21 |
Basics of System Control |
2P+2C |
Z,ZK |
Z,L |
3 |
5 |
Hyniová K. |
18103 |
BIE-TPS.21 |
Computer Networks Technologies |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Smotlacha V. |
18104 |
BIE-UKB.21 |
Introduction to Cybersecurity |
3P+1C |
Z,ZK |
Z |
3 |
5 |
Bělohoubek J., Pokorný D., Trummová I. |
18106 |
BIE-SWI.21 |
Software Engineering |
2P+1C |
Z,ZK |
L |
4 |
5 |
Rybola Z. |
18102 |
BIE-SP1.21 |
Team Software Project 1 |
4C |
KZ |
L |
4 |
5 |
|
18102 |
BIE-VPS.21 |
Selected Topics in Computer Networking |
2P+2C |
Z,ZK |
L |
4 |
5 |
Bettaz M. |
18104 |
BIE-ADU.1 |
Unix Administration |
2P+2C |
Z,ZK |
L |
4 |
5 |
|
18104 |
BIE-VDC.21 |
Virtualization and Data Centers |
2P+2C |
Z,ZK |
L |
4 |
5 |
Kašpar J. |
18104 |
BIE-EHA.21 |
Ethical Hacking |
2P+2C |
Z,ZK |
L |
4 |
5 |
Dostál J., Šimko A., Kolárik M. |
18106 |
BIE-KOM |
Conceptual Modelling |
2P+2C |
Z,ZK |
Z |
5 |
5 |
|
18102 |
BIE-SP2.21 |
Team Software Project 2 |
2C |
KZ |
Z |
5 |
5 |
|
18102 |
BIE-AWD.21 |
Web and Database Server Administration |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Bařinka L., Valenta M. |
18102 |
BIE-MPP.21 |
Methods of interfacing peripheral devices |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Skrbek M. |
18103 |
BIE-PNO |
Practical Digital Design |
2P+2C |
KZ |
Z |
5 |
5 |
Novotný M. |
18103 |
BIE-SRC.21 |
Real-time systems |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Kubátová H., Vyskočil J. |
18103 |
BIE-SPS.21 |
Administration of Computer Networks and Services |
2P+2S |
Z,ZK |
Z |
5 |
5 |
Dostálek L., Kubr J. |
18104 |
BIE-IOT.21 |
Internet of Things |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Černý V., Kosková Třísková L. |
18104 |
BIE-SIP.21 |
Network Programming |
2P+2C |
Z |
Z |
5 |
5 |
Fesl J. |
18104 |
BIE-ASB.21 |
Applied Network Security |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Dostál J., Trofimova Y. |
18106 |
BIE-ZSB.21 |
Basics of System Security |
2P+2C |
Z,ZK |
Z |
5 |
5 |
Fornůsek S., Svetlík M. |
18106 |
BIE-TAB.21 |
Applications of Security in Technology |
2P+2C |
Z,ZK |
L |
6 |
5 |
Bělohoubek J., Pozděna M., Skórski M. |
18106 |
|