st Introduction to information technology security, basic concepts
2nd Current state of safety in Czech companies.
3rd The causes and reasons for losses, losses.
4th Building system security in information technology.
5th Physical (technical) safety.
6th Regime protection, personnel protection.
7th Hardware protection, software protection.
8th Network Security. Safety features and security in computer networks. Security of data transmission.
9th Cryptography. Cryptographic algorithms. Symmetric and asymmetric cryptography. Electronic signature.
10th Security features in computer networks: security gates, security protocols,
11th Security system: backup, resource protection, integrity checking, monitoring, virus protection.
12th To attack: intrusion detection, cleaning up after an attacker recovery operation, the measures against recurrence.
13th Security in information technology law.
14th Information security and regulatory standards. Classified information.
2nd Current state of safety in Czech companies.
3rd The causes and reasons for losses, losses.
4th Building system security in information technology.
5th Physical (technical) safety.
6th Regime protection, personnel protection.
7th Hardware protection, software protection.
8th Network Security. Safety features and security in computer networks. Security of data transmission.
9th Cryptography. Cryptographic algorithms. Symmetric and asymmetric cryptography. Electronic signature.
10th Security features in computer networks: security gates, security protocols,
11th Security system: backup, resource protection, integrity checking, monitoring, virus protection.
12th To attack: intrusion detection, cleaning up after an attacker recovery operation, the measures against recurrence.
13th Security in information technology law.
14th Information security and regulatory standards. Classified information.