Cyber Security
Ing. Lukáš Pavlík, Ph.D.
Cyber Security
Info
Předmět
Období
léto 2022
The Goal of Course and Conditions of Exam

  • to pass the exam, it is necessary to pass at least 6of the test

Recommended literature:

  • ROHMEYER, Paul a Jennifer L. BAYUK. Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions. New York: Apress, 2018, 259 s. ISBN 9781484241936.
  • HODSON, Christopher J. Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls. London: Kogan Page, 2019, 416 s. ISBN 9780749484125.
  • Kapitola obsahuje:
    2
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 14. 2. 2022 do 20. 2. 2022.
    Kapitola obsahuje:
    1
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 21. 2. 2022 do 27. 2. 2022.
    Kapitola obsahuje:
    2
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 28. 2. 2022 do 6. 3. 2022.
    Kapitola obsahuje:
    1
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 7. 3. 2022 do 13. 3. 2022.
    Kapitola obsahuje:
    1
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 14. 3. 2022 do 20. 3. 2022.
    Kapitola obsahuje:
    1
    Studijní materiály
    1
    Studijní text
    Učitel doporučuje studovat od 21. 3. 2022 do 27. 3. 2022.
    Učitel doporučuje studovat od 28. 3. 2022 do 3. 4. 2022.
    Učitel doporučuje studovat od 4. 4. 2022 do 10. 4. 2022.
    Učitel doporučuje studovat od 11. 4. 2022 do 17. 4. 2022.
    Učitel doporučuje studovat od 18. 4. 2022 do 24. 4. 2022.
    Učitel doporučuje studovat od 25. 4. 2022 do 1. 5. 2022.
    Učitel doporučuje studovat od 2. 5. 2022 do 8. 5. 2022.
    Učitel doporučuje studovat od 9. 5. 2022 do 15. 5. 2022.

    Týden 1

    Topic: Introduction to the issue of security – the concept of security, enterprise information security, basic terms

    After studying the chapter you will be able to:

    • Characterize area of security
    • Define basic terms
    • Clarify politics of passwords

    Keyword:

    Cyber security, password, security policy, cyber threat.

    Týden 2

    Topic: Threats and challenges of information society

    After studying the chapter you will be able to:

    • Characterize the information society
    • Define cyber threats to organizations and their information environment
    • Explain and give examples of technical and environmental threats to the information society

    Keyword:

    Information society, technical threat, enviromental threat, insider, target.

    Týden 3

    Topic: Risk analysis (risk management, risk evaluation, risk treatment)

    After studying the chapter you will be able to:

    • Define risk analysis
    • List steps of risk analysis
    • Characterize process of evaluation risks
    • Create risk matrix

    Keywords:

    Risk analysis, methods, probability, impact, risk management. 

    Týden 4

    Topic: International security organizations and standards

    After studying the chapter you will be able to:

    • Characterize elements of information systems
    • Define international security organizations
    • List international standards in the field of cyber security

    Keywords:

    CSERT, ENISA, NIS, COBIT, ITIL, ISO standards

    .

    Týden 5

    Topic: Insurance as a tool of cyber security

    After studying the chapter you will be able to:

    • characterize insurance and its role in the field of cyber security,
    • define basic terminology in the field of cyber insurance,
    • list the process of arranging insurance against cyber risks.

    Keywords:

    Insurance, risk, financial impact, personal data.

    Týden 6

    Topic: The Biggest Cyber Threats of Recent Years

    After studying the chapter you will be able to:

    • list the biggest cyber threats of recent years,
    • characterize the procedure of cyber threats investigation,
    • define the possible impacts of cyber threats in the context of today's society.

    Keywords:

    Ransomware, phishing, social engineering, incident, investigation.

    Týden 7

    Týden 8

    Týden 9

    Týden 10

    Týden 11

    Týden 12

    Týden 13