Information on degree branches

CodeDegree Branch TitleLanguage of InstructionStandard Length of Study
1801T064Information and Communication SecurityCzech, English2.0 years
Qualification AwardedMaster degree, Ing.
Level of QualificationSecond Cycle
Access to Further StudiesThe graduates may continue in a Third cycle
Graduation Requirements120 ECTS Credits, Final state examination, Diploma thesis
Mode of StudyFull-time
Branch Director or EquivalentPersonal IDName
ZEL01prof. Ing. Ivan Zelinka, Ph.D.
Course Structure Diagram with ECTS Credits1. year / Winter semester1. year / Summer semester
30 ECTS Credits30 ECTS Credits
2. year / Winter semester2. year / Summer semester
30 ECTS Credits30 ECTS Credits
Specific Admission Requirements
Specific admission requirements are determined by the Dean of the faculty. For more information please click here.
Specific Arrangements for the Recognition of Prior Learning
Informal learning - max. 60% of credits gained in prior lifelong learning can be recognized, as determined by the Dean of the Faculty.
Qualification Requirements and Regulations
Qualification Requirements:
Finished higher education in Bachelor's degree programme.
Regulations:
The Czech educational system is regulated by the Higher Education Act (Act 111/1998). Studies at VŠB-TUO are regulated by the Statute of VŠB – Technical University of Ostrava.
Profile of the Branch
(in full-time mode of study only) The field of study called Information and communication security was included in the Information and Communication Technology degree study programme as the follow-up master’s programme. The Faculty of Electrical Engineering and Computer Science at VSB-TUO responds by this inclusion to the needs of industry and the development of modern society, where security has become one of the key topics. The number and scope of cybernetic attacks is increasing every year and thus the need for skilled professionals in the field of information and communications security is also growing. In the last decade we have witnessed a massive digitization of information, a transition to cloud solutions and growing interest in the concept of the Internet of Things, which opens up new opportunities, but also brings new security risks. Revealing, identifying and minimizing security risks requires knowledge of ICT (Information & Communication Technology) on the part of the graduates and profiling in the field of information and communications security, together with the ability to apply knowledge in practice in information systems and computer networks, and ultimately the need for knowledge of legal issues related to cybernetic criminality.
Key Learning Outcomes
Key Lerning Outcomes are Expressed in following Structure: Knowledge, Skills, General competencies
Knowledge:
The graduate will have knowledge in many modern areas that fall within the sphere of computer security. This primarily concerns the methods for attacking and defending computers. The graduate will know the types and structures of computer malware, including its reverse analysis, methods of the abuse and protection of multimedia files, protecting operating systems and cloud-based systems, mobile devices and applications of modern and also unconventional cryptographic methods. Neither the legal issues nor the background of computer criminality will fail to be covered.
Skills:
The graduate will be able to manage and secure all types of operating systems, mobile devices and their communications and will be able actively to secure large computer systems and perform basic digital forensic analysis and must understand electronic security components and systems. The graduate will also be able to design safety methodologies for new workplaces that aim at their active protection and he should also be able to conduct training in the field of information and communications security.
General competencies:
The graduate will have a sufficient expert background to be able to continue with further self-education, which in this area is a daily necessity. He will be able to conduct high-quality expert communication with experts and also with lay people and provide them with interpretation and understanding of the complexity of information and communication security.
Occupational Profiles of Graduates with Examples
The graduates will be able to assert themselves virtually everywhere where there are computers and mobile communication systems that must be protected. The jobs appropriate to their qualifications can be found both in the public sector (the police, army, offices...) and in the private sector, and this in the whole spectrum of possible production processes and the provision of services. The graduates will also have the opportunity to assert themselves directly in software companies engaged in the production of antivirus protection or in the provision of professional interventions and training.
Examination Regulations, Assessment and Grading
Examination regulations, assesment and grading are described in the Study and Examination Rules.
Curriculum:
Remark:
Course block: Compulsory - all courses are compulsory.
Course block: Choice-compulsory - student has to choose at least one course from the list of courses.
Course block: Optional - student can choose any course from the list of courses.
 
IMPORTANT: Student has to select so many courses to reach 30 ECTS credits per semester. Rules in detail and convenient selection of courses can be consulted with the programmme director.
Bellow stated courses are assigned for the degree studies only. Students coming to VŠB-TUO for an exchange stay must select courses from the List of courses for exchange students.
 
1. Semester1. yearWinter semester30 ECTS Credits
2. Semester1. yearSummer semester30 ECTS Credits
3. Semester2. yearWinter semester30 ECTS Credits
4. Semester2. yearSummer semester30 ECTS Credits