Faculty of Information Technology, BUT

Field of Study Details

Information Technology Security

Abbreviation: MBS

Length of Study: 2 years

Min. Credits: 120

Degree Programme: Information Technology

Language of Instruction: Czech

Form of Study: full-time

Accredited from: 2008 Accredited till: 2024 Last admissions: 2019

The primary goal of the study programme is to help students to understand the principles of security threats in information technology and appropriate security measures. Students will study basic security principles as well as they will understand the importance of security measures in large information systems. They will also know the principles of creating new solutions that lead to the design, installation, operation and maintenance of secure information systems. Mandatory subjects will provide further extension of knowledge that the students receive in the bachelors study programme - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics. By selecting an appropriate set of optional subjects, students can further extend their abilities of theoretic foundations in the field of formal specification and verification or to focus on more practical issues - for example embedded systems and hardware, software development and operation or computer networks and communications.
Key learning outcomes
Student of the branch acquire deeper knowledge in the information technology security. This give him knowledge and skills base to analyse, design and verification of problems of security threats in information technology and appropriate security measures. Study in this branch also provide further extension of knowledge that the students receive in the bachelors study program - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics.
Occupational profiles of graduates with examples
  • The graduate will have a good knowledge of components and architectures of information systems with an emphasis on security components and security functions. The graduate will be able to integrate both the technical and software products used in secure information systems development. The graduate will have a solid knowledge (and the ability to apply) of security technologies and important standards that are essential for both the development and the operation of information systems.
  • The graduate will be ready to solve projects, operate and maintain information systems where one of the key issues is security. The graduate will also be prepared for further research and development of methods, tools and technologies for developing secure components, applications and large systems. The graduate understand principles of security maintenance and is able to apply these principles in development of computer systems and networks.
  • Specializations for profession: information systems projecting (or information systems in general), programmer, security architect, information systems maintenance, security administrator. The graduate of this study programme can use his/her knowledge in development and research departments as well as in institutions targeting on software system development with the primary concern on security. The graduate can also work in institutions that operate these information systems, e.g. government institutions and local administrations, in army, health service or any other industrial organizations.
Extent of the final state examinations
The State Final Examination has two parts: A defense of the Master Thesis, and a discussion based on selected topics from the course "Information systems security" which is derived from compulsory courses of the MBS Branch of Study. The areas of possible questions must be approved by the Study Branch Council, and students will be informed about the selected topics at least 2 months before the state final examination is held in the particular academic year. The discussion will be held on two topics.
Examples of theses
  • Security of VoIP systems
  • Security Analysis of WiFi Networks
  • Encrypting Landlines Phone Communication
  • Effective Implementation of Elliptic Curves
  • AES Tolerance to Timing Analysis
  • Configurable Security Email Proxy
  • Side Channel Analysis of Cryptographic Libraries
  • Creation of Risk Analysis Model
  • Biometric Recognition of 3D Faces
  • Biometric Liveness Detection - Optical Features

Choose academic year and curriculum

1. year of study, winter semester

MATMathematical Structures in Computer Science5CEx
TINTheoretical Computer Science7CCr+Ex
HSCHardware/Software Codesign5CECCr+Ex
SMTSeminar of Mathematical Structures2ECr

1. year of study, summer semester

FLPFunctional and Logic Programming5CCr+Ex
KKOData Coding and Compression5CCr+Ex
PDSData Communications, Computer Networks and Protocols5CEx
PRLParallel and Distributed Algorithms5CCr+Ex
PP1Project Practice 15ECr

2. year of study, winter semester

BIOBiometric Systems5CCr+Ex
SEPSemester Project5CClCr
PP2Project Practice 25EClCr

2. year of study, summer semester

DIPMaster's Thesis13CCr
NSBProjecting, Administration and Security5CCr+Ex

all years of study, winter semester

BISInformation System Security5CCr+Ex
SAVStatic Analysis and Verification5CEBCr+Ex
SEMSensors and measurement5CEBCr+Ex
AVSComputation Systems Architectures5CECCr+Ex
AEUEnglish for Europe3CEHCr+Ex
FCEEnglish: Practical Course of Business Conversation and Presentation3CEHCr
FIKPhilosophy and the Culture *)3CEHCr
FITHistory and Philosophy of Technology3CEHCr
HKOCommunication and Presentation Skills3CEHCr
HVRLeadership and Time Management3CEHCr
JA3Conversation through Hot Current Issues3CEHCr+Ex
PRMFundamentals of Law3CEHCr
BMSWireless and Mobile Networks5CENCr+Ex
PKSAdvanced Communication Systems5CENCr+Ex
AISInformation Systems Analysis and Design5CESCr+Ex
ZZNKnowledge Discovery in Databases5CESCr+Ex
AGSAgents and Multiagent Systems5EEx
C2PImplementing Cisco IP Switched Networks (SWITCH)5EClCr
EIPEconomics of Information Products5EEx
GALGraph Algorithms5EEx
GJAGraphical User Interfaces in Java5ECr+Ex
GMUGraphic and Multimedia Processors5ECr+Ex
GUXGraphical User Interfaces in X Window System5EEx
GZNGraphical and Sound Interfaces and Standards5EEx
PCSAdvanced Digital Systems5EEx
PDBAdvanced Database Systems5ECr+Ex
PDIDistributed Application Environment5EEx
PGPaAdvanced Computer Graphics (in English)5EEx
PGRComputer Graphics5EEx
POVaComputer Vision (in English)5EEx
ROBaRobotics (in English)5EEx
RTSaReal-Time Systems (in English)5EEx
SFCSoft Computing5ECr+Ex
SINIntelligent Systems5EEx
SRIStrategic Management of Information Systems5EEx
TAMaApplication Development for Mobile Devices (in English)5EClCr
THEGame Theory5ECr+Ex
VINComputer Art5EClCr
VYPaCompiler Construction (in English)5EEx
ZPJaNatural Language Processing (in English)5EEx
ZPXProfessional Practice, Abroad5ECr

all years of study, summer semester

PISAdvanced Information Systems5CCr+Ex
BZASecure Hardware Devices5CEBEx
SNTSimulation Tools and Techniques5CEBCr+Ex
SPPFault Tolerant Systems5CEBCr+Ex
NAVDesign of Embedded Systems5CECEx
AEUEnglish for Europe3CEHCr+Ex
FIKPhilosophy and the Culture3CEHCr
FITHistory and Philosophy of Technology *)3CEHCr
HKOCommunication and Presentation Skills3CEHCr
HVRLeadership and Time Management3CEHCr
JA3Conversation through Hot Current Issues3CEHCr+Ex
PRMFundamentals of Law3CEHCr
WAPInternet Applications5CENCr+Ex
DJADynamic Languages5CESEx
POSAdvanced Operating Systems5CESEx
PPPPractical Parallel Programming5ECr+Ex
BINBio-Inspired Computers5EEx
CSOaCCNA Cybersecurity Operations (in English)5EClCr
C1PImplementing Cisco IP Routing (ROUTE) *)5EClCr
C3PTroubleshooting and Maintaining Cisco IP Networks (TSHOOT)5EClCr
DFAaDigital Forensics (in English)5EEx
EVOApplied Evolutionary Algorithms5EEx
FVSFunctional Verification of Digital Systems5EEx
FYOPhysical Optics5EEx
GISGeographical Information Systems *)5ECr+Ex
MARMarketing *)5ECr+Ex
MEKEconomics for Managers *)5ECr+Ex
MMATMatrices and Tensors Calculus5ECr+Ex
MPRProject Management5ECr+Ex
MBAModel-Based Analysis5EEx
PMAProject Manager5EClCr
SLOaComplexity (in English)5EEx
SSPStochastic Processes4ECr+Ex
STMStrategic Management *)5ECr+Ex
UXIaUser Experience and Design of User Interfaces and Services (in English)5EClCr
VGEComputational Geometry5EEx
VIZaVisualization and CAD (in English)5EClCr
VNVHigh Performance Computations5EEx
VYFComputational Photography5EClCr
ZPOImage Processing5EEx
ZPXProfessional Practice, Abroad5ECr
ZRESpeech Signal Processing5EEx
Course is not open in this academic year
Compl: Course completion: Ex - examination, Cr - credit, ClCr - classified credit, Co - colloquium
Duty: C - compulsory, CEx - compulsory-elective group x, R - recommended, E - elective

Compulsory-elective groups

AbbrvMin. coursesMax. coursesMin.credOver asCoursesTitle
B290EBZA, SAV, SEM, SNT, SPPSecurity and verification
C190EAVS, HSC, NAVHardware
H113EAEU, FCE, FIK, FIT, HKO, HVR, JA3, PRM, RETSocial Course
N190EBMS, PKS, WAPComputer networks and communication
S190EAIS, DJA, POS, ZZNSoftware
If you are allowed to enroll more CE courses than the required minimum, then successfully completed courses that exceed Min. courses (or Min.kred, if not 0) of the CE group, will be assigned as courses of duty Over as.
Back to top