Skip to main content
Skip header

Computer Attacks and Defence

Summary

The course will cover a wider range of defense techniques and attacks on computer systems. There will be mentioned both historically classic techniques and modern processes and algorithms. The course will include targeted (hacking) and spyware attacks, botnets, and so on. Part of the course will also be the basics of digital forensic analysis and penetration testing. After completing the course, the student should have a thorough knowledge of the above-mentioned areas, including the possibility of applying countermeasures and enhancing the security of computer systems. Part of the course will include separate assignments from lectures (or exercises). Their review and presentation will be part of lectures.
Course will include individual assignments (presentations or projects). Their review and presentation will be part of lectures.

Literature

1. Diogenes Y., Ozkaya E., Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, Packt Publishing, 2019, ISBN 978-1838827793 

Advised literature

[1] Velu V. K., Beggs R., Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux, Packt Publishing, 2019, ISBN 978-1789340563 
[2] Anson S., Applied Incident Response, Wiley, 2020, ISBN 978-1119560265 
[3] Roberts J. S., Brown R., Intelligence-Driven Incident Response: Outwitting the Adversary, O'Reilly Media, 2017, ISBN 978-1491934944 


Language of instruction čeština, angličtina, čeština, angličtina, čeština, angličtina
Code 460-4122
Abbreviation POU
Course title Computer Attacks and Defence
Coordinating department Department of Computer Science
Course coordinator prof. Ing. Ivan Zelinka, Ph.D.