Skip to main content
Skip header

Fundamentals of IT Security

Type of study Follow-up Master
Language of instruction English
Code 440-8601/02
Abbreviation ZBvIT
Course title Fundamentals of IT Security
Credits 4
Coordinating department Department of Telecommunications
Course coordinator prof. Ing. Miroslav Vozňák, Ph.D.

Subject syllabus

Introduction to security, fundamental terminology, approaches to information secrecy, steganography and cryptography, overview of the evolution of encryption.

Monitoring, scanning and analysis of network traffic from a security perspective. Google hacking and finding traffic fingerprints.

Hashing functions, principles and properties, modern symmetric and asymmetric ciphers, Quantum and post-quantum cryptography.

Management and distribution of keys, purpose of certificates, digital signature, public key infrastructure, tools for generating certificates and keys, certification authority, revocation of certificates.

Secure remote access management, remote access protocols, security mechanisms, secure file transfer.

IPsec, SSL/TLS, network and transport layer security, virtual private networks.

Communication security at the local, national and international level, personal data protection, cybercrime, the legal context of cyber security and behavior in cyberspace.

Security of mobile and radio networks, security of the Internet of Things concept.

Systems for autonomous monitoring in computer networks - deployment, rules, options, demilitarized zones, traffic monitoring.

Firewalls - division, functions, examples, configuration, options.

Systems for network penetration and performance testing.

Multimedia security - audio, video, IM security - monitoring, eavesdropping, steganography.

Honeypots and honeynets - description, properties and possibilities of use, configuration, methods of deployment, information on the course of the test.

Literature

STALLINGS W. Cryptography and Network Security: Principles and Practice (8th Edition). Pearson: 8th Ed., 2023. ISBN 978-1292437484 .
KONHEIM A. Computer Security and cryptography. JWS, Inc., 2007. ISBN: 978-0-471-94783-7 
MEHIC M., RASS S., FAZIO P., VOZŇÁK M. Quantum Key Distribution Networks. Springer Nature: 1st ed., 2022. ISBN 978-3031066078 .

Advised literature

KAUFMAN CH., PERLMAN R., SPECINER M. Network Security, Private Communication in a Public World. Prentice Hall: 2nd ed., 2002. ISBN 0130460192 .
MITNICK K. D., SIMON W. L., Wozniak K. W. The Art of Deception: Controlling the Human Element of Security. Wiley, 2003. ISBN 076454280X .