Skip to main content
Skip header

Cyber security

Type of study Follow-up Master
Language of instruction English
Code 440-4131/02
Abbreviation KB
Course title Cyber security
Credits 4
Coordinating department Department of Telecommunications
Course coordinator Ing. Filip Řezáč, Ph.D.

Subject syllabus

1. Introduction to security, history of network security, development and modern trends in security.
2. Division of modern ciphers - symmetric/asymmetric, block/stream, cipher modes, key distribution options - DH.
3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerability, implementation, use.
4. PKI - certificates, PGP, X.509, elliptic curves, digital signature.
5. SSL/TLS libraries - configuration and proposals over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates.
6. SSH - version, description, advanced configuration - file exchange, traffic tunneling.
7. VPN - principle, TUN/TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard.
8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, traffic analysis based on signatures, advanced behavioral analysis from NetFlow.
9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE.
10. Authentication, multi-factor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on systems (SSO).
11. Selected parts from biometric authentication.
12. Interferometry, Raman, Brillouin and Rayleigh scattering and use of fiber optic sensors in security applications.
13. Principles of key distribution using physical principles of quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks.

E-learning

Literature

1. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5

Advised literature

1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW