Skip to main content
Skip header

Cyber Security I

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code440-4117/01
Number of ECTS Credits Allocated5 ECTS credits
Type of Course Unit *Compulsory
Level of Course Unit *Second Cycle
Year of Study *First Year
Semester when the Course Unit is deliveredWinter Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites There are no prerequisites or co-requisites for this course unit
Name of Lecturer(s)Personal IDName
VOZ29prof. Ing. Miroslav Vozňák, Ph.D.
REZ106Ing. Filip Řezáč, Ph.D.
Summary
The course will provide an explanation of advanced mechanisms for securing communication networks regardless of the transmission medium. The student will get acquainted with modern cryptographic tools and protocols, which they will learn to apply mainly in the practical level to new or existing network infrastructures.
Learning Outcomes of the Course Unit
Learning outcomes are set so that students are able to identify, apply and solve problems in the field of advanced cyber security and understand in detail modern methods of securing metallic, wireless and optical communications.
Course Contents
1. Introduction to security, history of network security, development and modern trends in security.
2. Distribution of modern ciphers - symmetric / asymmetric, block / stream, cipher modes, key distribution options - DH.
3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerabilities, implementation, use.
4. PKI - certificates, PGP, X.509, elliptic curves, digital signature.
5. SSL / TLS libraries - configurations and designs over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates.
6. SSH - version, description, advanced configuration - file exchange, traffic tunneling.
7. VPN - principle, TUN / TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard.
8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, signature-based traffic analysis, advanced behavioral analysis from NetFlow.
9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE.
10. Authentication, multifactor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on (SSO) systems.
11. Selected parts of biometric authentication.
12. Interferometry, Raman, Brillouin and Rayleigh scattering and the use of fiber optic sensors in security applications.
13. Principles of key distribution using physical principles of quantum mechanics (QKD), protocols QKD - BB84, SARG04 and E91, QKD in quantum networks.
14. Introduction to penetration and performance testing - security auditing, testing methodologies and security analysis and certification - Common Criteria, JISE, FIPS, EAL.
Recommended or Required Reading
Required Reading:
1. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5.
1. ŘEZÁČ, F., VOZŇÁK, M., ROZHON, J.: Bezpečnost v komunikacích, 2013, vysokoškolská skripta
2. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5
Recommended Reading:
1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW
2. Ivan Ristic, Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications, 2014, ISBN-13: 978-1907117046
1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW
2. Jan Kolouch, CyberSecurity, 2019, ISBN 9788088168317
3. Jan Kolouch, CyberCrime, 2017, ISBN 978-80-88168-15-7
Planned learning activities and teaching methods
Lectures, Tutorials, Experimental work in labs, Project work
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit40 (40)25
                ProjektProject15 0
                Referát/esejOther task type10 0
                Laboratorní úloha 1Laboratory work5 0
                Laboratorní úloha 2Laboratory work5 0
                Laboratorní úloha 3Laboratory work5 0
        ExaminationExamination60 (60)26
                TestWritten examination30 0
                Praktická částOther task type20 0
                Ústní zkouškaOral examination10 0