You are currently viewing the whole syllabus; go back to default view.
The speed of loading and viewing the syllabus may be slower when showing a large amount of content.
Týden 1
Topic: Introduction to the issue of security – the concept of security, enterprise information security, basic terms
After studying the chapter you will be able to:
- Characterize area of security
- Define basic terms
- Clarify politics of passwords
Keyword:
Cyber security, password, security policy, cyber threat.
Týden 2
Topic: Threats and challenges of information society
After studying the chapter you will be able to:
- Characterize the information society
- Define cyber threats to organizations and their information environment
- Explain and give examples of technical and environmental threats to the information society
Keyword:
Information society, technical threat, enviromental threat, insider, target.Týden 3
Topic: Risk analysis (risk management, risk evaluation, risk treatment)
After studying the chapter you will be able to:
- Define risk analysis
- List steps of risk analysis
- Characterize process of evaluation risks
- Create risk matrix
Keywords:
Risk analysis, methods, probability, impact, risk management.
Týden 4
Topic: International security organizations and standards
After studying the chapter you will be able to:
- Characterize elements of information systems
- Define international security organizations
- List international standards in the field of cyber security
Keywords:
CSERT, ENISA, NIS, COBIT, ITIL, ISO standards
.
Týden 5
Topic: Insurance as a tool of cyber security
After studying the chapter you will be able to:
- characterize insurance and its role in the field of cyber security,
- define basic terminology in the field of cyber insurance,
- list the process of arranging insurance against cyber risks.
Keywords:
Insurance, risk, financial impact, personal data.
Týden 6
Topic: The Biggest Cyber Threats of Recent Years
After studying the chapter you will be able to:
- list the biggest cyber threats of recent years,
- characterize the procedure of cyber threats investigation,
- define the possible impacts of cyber threats in the context of today's society.
Keywords:
Ransomware, phishing, social engineering, incident, investigation.