Field of Study Details

Information Technology Security

Abbreviation: MBS

Length of Study: 2 years

Min. Credits: 120

Degree Programme: Information Technology

Language of Instruction: Czech

Form of Study: full-time

Accredited from: 2008 Accredited till: 2024 Last admissions: 2019

Profile

The primary goal of the study programme is to help students to understand the principles of security threats in information technology and appropriate security measures. Students will study basic security principles as well as they will understand the importance of security measures in large information systems. They will also know the principles of creating new solutions that lead to the design, installation, operation and maintenance of secure information systems. Mandatory subjects will provide further extension of knowledge that the students receive in the bachelors study programme - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics. By selecting an appropriate set of optional subjects, students can further extend their abilities of theoretic foundations in the field of formal specification and verification or to focus on more practical issues - for example embedded systems and hardware, software development and operation or computer networks and communications.

Key learning outcomes

Student of the branch acquire deeper knowledge in the information technology security. This give him knowledge and skills base to analyse, design and verification of problems of security threats in information technology and appropriate security measures. Study in this branch also provide further extension of knowledge that the students receive in the bachelors study program - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics.

Guarantor
Occupational profiles of graduates with examples
  • The graduate will have a good knowledge of components and architectures of information systems with an emphasis on security components and security functions. The graduate will be able to integrate both the technical and software products used in secure information systems development. The graduate will have a solid knowledge (and the ability to apply) of security technologies and important standards that are essential for both the development and the operation of information systems.
  • The graduate will be ready to solve projects, operate and maintain information systems where one of the key issues is security. The graduate will also be prepared for further research and development of methods, tools and technologies for developing secure components, applications and large systems. The graduate understand principles of security maintenance and is able to apply these principles in development of computer systems and networks.
  • Specializations for profession: information systems projecting (or information systems in general), programmer, security architect, information systems maintenance, security administrator. The graduate of this study programme can use his/her knowledge in development and research departments as well as in institutions targeting on software system development with the primary concern on security. The graduate can also work in institutions that operate these information systems, e.g. government institutions and local administrations, in army, health service or any other industrial organizations.
Extent of the State Final Examinations

The State Final Examination has two parts: A defense of the Master Thesis, and a discussion based on selected topics from the course "Information systems security" which is derived from compulsory courses of the MBS Branch of Study. The areas of possible questions must be approved by the Study Branch Council, and students will be informed about the selected topics at least 2 months before the state final examination is held in the particular academic year. The discussion will be held on two topics.

Examples of theses
  • Security of VoIP systems
  • Security Analysis of WiFi Networks
  • Encrypting Landlines Phone Communication
  • Effective Implementation of Elliptic Curves
  • AES Tolerance to Timing Analysis
  • Configurable Security Email Proxy
  • Side Channel Analysis of Cryptographic Libraries
  • Creation of Risk Analysis Model
  • Biometric Recognition of 3D Faces
  • Biometric Liveness Detection - Optical Features

Choose academic year and curriculum

1st year of study, winter semester

AbbrvTitleCredDutyComplFa
MATMathematical Structures in Computer Science5CExFME
TINTheoretical Computer Science7CCr+ExFIT
HSCHardware/Software Codesign5CECCr+ExFIT
SMTSeminar of Mathematical Structures2ECrFIT

1st year of study, summer semester

AbbrvTitleCredDutyComplFa
FLPFunctional and Logic Programming5CCr+ExFIT
KKOData Coding and Compression5CCr+ExFIT
PDSData Communications, Computer Networks and Protocols5CExFIT
PRLParallel and Distributed Algorithms5CCr+ExFIT
PP1Project Practice 15ECrFIT

2nd year of study, winter semester

AbbrvTitleCredDutyComplFa
BIOBiometric Systems5CCr+ExFIT
SEPSemester Project5CClCrFIT
PP2Project Practice 25EClCrFIT

2nd year of study, summer semester

AbbrvTitleCredDutyComplFa
DIPMaster's Thesis13CCrFIT
KRYCryptography5CCr+ExFIT
NSBProjecting, Administration and Security5CCr+ExFIT

all years of study, winter semester

AbbrvTitleCredDutyComplFa
BISInformation System Security5CCr+ExFIT
SAVStatic Analysis and Verification5CEBCr+ExFIT
SEMSensors and Measurement5CEBCr+ExFIT
AVSComputation Systems Architectures5CECCr+ExFIT
AEUEnglish for Europe3CEHCr+ExFEEC
FCEEnglish: Practical Course of Business Conversation and Presentation3CEHCrFIT
FIKPhilosophy and the Culture *)3CEHCrILL
FITHistory and Philosophy of Technology3CEHCrILL
HKOCommunication and Presentation Skills3CEHCrFIT
HVRLeadership and Time Management3CEHCrFIT
JA3Conversation through Hot Current Issues3CEHCr+ExFEEC
PRMFundamentals of Law3CEHCrILL
RETRhetoric3CEHCrILL
BMSWireless and Mobile Networks5CENCr+ExFIT
PKSAdvanced Communication Systems5CENCr+ExFIT
AISInformation Systems Analysis and Design5CESCr+ExFIT
ZZNKnowledge Discovery in Databases5CESCr+ExFIT
AGSAgents and Multiagent Systems5EExFIT
C2PImplementing Cisco IP Switched Networks (SWITCH)5EClCrFIT
EIPEconomics of Information Products *)5EExFIT
GALGraph Algorithms5EExFIT
GJAGraphical User Interfaces in Java5ECr+ExFIT
GMUGraphic and Multimedia Processors5ECr+ExFIT
GUXGraphical User Interfaces in X Window System5EExFIT
GZNGraphical and Sound Interfaces and Standards5EExFIT
PCSAdvanced Digital Systems5EExFIT
PDBAdvanced Database Systems5ECr+ExFIT
PDIDistributed Application Environment5EExFIT
PGPaAdvanced Computer Graphics (in English)5EExFIT
PGRComputer Graphics5EExFIT
POVaComputer Vision (in English)5EExFIT
ROBaRobotics (in English)5EExFIT
RTSaReal-Time Systems (in English)5EExFIT
SFCSoft Computing5ECr+ExFIT
SINIntelligent Systems5EExFIT
SRIStrategic Management of Information Systems5EExFIT
TAMaApplication Development for Mobile Devices (in English)5EClCrFIT
THEGame Theory5ECr+ExFIT
VINComputer Art5EClCrFIT
VYPaCompiler Construction (in English)5EExFIT
ZPJaNatural Language Processing (in English)5EExFIT
ZPXProfessional Practice, Abroad5ECrFIT

all years of study, summer semester

AbbrvTitleCredDutyComplFa
PISAdvanced Information Systems5CCr+ExFIT
BZASecure Hardware Devices5CEBExFIT
SNTSimulation Tools and Techniques5CEBCr+ExFIT
SPPFault Tolerant Systems5CEBCr+ExFIT
NAVDesign of Embedded Systems5CECExFIT
AEUEnglish for Europe3CEHCr+ExFEEC
FIKPhilosophy and the Culture3CEHCrILL
FITHistory and Philosophy of Technology *)3CEHCrILL
HKOCommunication and Presentation Skills3CEHCrFIT
HVRLeadership and Time Management3CEHCrFIT
JA3Conversation through Hot Current Issues3CEHCr+ExFEEC
PRMFundamentals of Law3CEHCrILL
RETRhetoric3CEHCrILL
WAPInternet Applications5CENCr+ExFIT
DJADynamic Languages5CESExFIT
POSAdvanced Operating Systems5CESExFIT
PPPPractical Parallel Programming5ECr+ExFIT
BIFBioinformatics5EExFIT
BINBio-Inspired Computers5EExFIT
CSOaCCNA Cybersecurity Operations (in English)5EClCrFIT
C1PImplementing Cisco IP Routing (ROUTE) *)5EClCrFIT
C3PTroubleshooting and Maintaining Cisco IP Networks (TSHOOT)5EClCrFIT
DFAaDigital Forensics (in English)5EExFIT
EVOApplied Evolutionary Algorithms5EExFIT
FVSFunctional Verification of Digital Systems5EExFIT
FYOPhysical Optics5EExFEEC
GISGeographical Information Systems *)5ECr+ExFIT
LOGLogic5ECr+ExFME
MARMarketing *)5ECr+ExFME
MEKEconomics for Managers *)5ECr+ExFBM
MMATMatrices and Tensors Calculus5ECr+ExFEEC
MPRProject Management5ECr+ExFIT
MULMultimedia5EExFIT
OPMOptimization4ECr+ExFME
MBAModel-Based Analysis5EExFIT
PMAProject Manager5EClCrFIT
SLOaComplexity (in English)5EExFIT
SSPStochastic Processes4ECr+ExFME
STMStrategic Management *)5ECr+ExFBM
UXIaUser Experience and Design of User Interfaces and Services (in English)5EClCrFIT
VGEComputational Geometry5EExFIT
VIZaVisualization and CAD (in English)5EClCrFIT
VNVHigh Performance Computations5EExFIT
VYFComputational Photography5EClCrFIT
ZPOImage Processing5EExFIT
ZPXProfessional Practice, Abroad5ECrFIT
ZRESpeech Signal Processing5EExFIT
Course is not open in this academic year
Compl: Course completion: Ex - examination, Cr - credit, ClCr - classified credit, Co - colloquium
Duty: C - compulsory, CEx - compulsory-elective group x, R - recommended, E - elective

Compulsory-elective groups

AbbrvMin. coursesMax. coursesMin.credOver asCoursesTitle
B290EBZA, SAV, SEM, SNT, SPPSecurity and verification
C190EAVS, HSC, NAVHardware
H113EAEU, FCE, FIK, FIT, HKO, HVR, JA3, PRM, RETSocial Course
N190EBMS, PKS, WAPComputer networks and communication
S190EAIS, DJA, POS, ZZNSoftware
If you are allowed to enroll more CE courses than the required minimum, then successfully completed courses that exceed Min. courses (or Min.cred, if not 0) of the CE group, will be assigned as courses of duty Over as.
Back to top