1. Introduction
2. Introduction to theory of information
3. Software
4. Malware and methods of protection against it
5. Encryption – history, symmetrical encryption
6. Asymmetric methods of encryption and electronic signature
7. Electronic signature – legislative view
8. Introduction to computer networks
9. E-government
10. Information systems of public administration
11. Cybernetic security of Czech republic
12. Telecomunications – legislative view
13. Fast information and safety focused information systems
2. Introduction to theory of information
3. Software
4. Malware and methods of protection against it
5. Encryption – history, symmetrical encryption
6. Asymmetric methods of encryption and electronic signature
7. Electronic signature – legislative view
8. Introduction to computer networks
9. E-government
10. Information systems of public administration
11. Cybernetic security of Czech republic
12. Telecomunications – legislative view
13. Fast information and safety focused information systems