You are currently viewing the whole syllabus; go back to default view.
The speed of loading and viewing the syllabus may be slower when showing a large amount of content.
Týden 1
Topic: Introduction to the issue of security – the concept of security, enterprise information security, basic terms
After studying the chapter you will be able to:
- Characterize area of security
- Define basic terms
- Clarify politics of passwords
Keyword:
Cyber security, password, security measure.
Týden 2
Topic: Multi-layered security (defence in depth) of information systems
After studying the chapter you will be able to:
- Define multi-layered security
- Create effective measures for data security
Keywords:
Multi-layered security, measure, risk.
Týden 3
Topic: Security in operating systems, access management, identification, authentication, authorization
After studying the chapter you will be able to:
- Define authentication
- Clarify authorization
- Characterize types of encryption
Keywords:
Authentication, authorization, sym,etric, asymmetric, encryption.
Týden 4
Topic: Internet security, protocols, wireless networks
After studying the chapter you will be able to:
- List types of security protocols
- Characterize secure email communication
- Define wireless networks
Keywords:
Internet security, protocols, security tools.
Týden 5
Topic: Workstation security
After studying the chapter you will be able to:
- Define firewalls
- Characterize worksation in rea of cyber security
- Clarify types of security sotware
Keywords:
Firewall, user, security software, SCADA system
Týden 6
Topic: Selected cyber threats and
their characteristics
After studying the chapter you will be able to:
- Characterize selected cyber threats
- Define potential impacts of cyber threats
- List some examples of cyber attacks
Keywords:
Threat, attack, impact.
Týden 7
Topic: Information security management system – ISO / IEC 27000, PDCA, ITIL methodology principles
After studying the chapter you will be able to:
- Characterize ISMS
- Define ISO 27001, 27002, 27005
- Describe methodology ITIL
- Characterize methodology COBIT
Keywords:
ISMS, ISO, ITIL, COBIT
Týden 8
Topic: Security risk analysis (identification of assets, risk assessment, the draft of countermeasures)
After studying the chapter you will be able to:
- Define risk analysis
- List methods of risk analysis
- Characterize process of evaluation risks
Keywords:
Risk analysis, methods, probability.
Týden 9
Topic: Realization of security – conception of security, security policy, security measures
After studying the chapter you will be able to:
- Define dimensions of security
- Characterize security policy
- Create security politics
Keywords:
Dimension, security, policy, security environment
Týden 10
Topic: Cyber threats and their impacts from the perspective of insurance industry
After studying the chapter you will be able to:
- Characterize insurance and its role in the field of cyber security
- Define European Union legislation on information systems security
- List the types of insurance that relate to cyber security
Insurance, risk, financial impact, personal data.
Týden 11
Topic: Papers and electronic documents – definition, properties, security and authentication, electronic signature
After studying the chapter you will be able to:
- Define the term electronic document
- Describe the basic principles of electronic document protection
- Explain the requirements of the eIDAS Regulation
Act, document, electronic document.
Týden 12
Topic: Data backup and recovery of system
After studying the chapter you will be able to:
- Define types of backups
- List methods of backups
- Describe recovery software
Keywords:
Backup, recovery, plan, data.
Týden 13
Topic: The Biggest Cyber Threats of Recent Years
After studying the chapter you will be able to:
- list the biggest cyber threats of recent years,
- characterize the procedure of cyber threats investigation,
- define the possible impacts of cyber threats in the context of today's societ.
Keywords:
Ransomware, phishing, social engineering, incident, investigation..