Specialization Details

Cybersecurity

Abbreviation: NSEC

Length of Study: 2 years

Min. Credits: 120

Degree Programme: Information Technology and Artificial Intelligence

Language of Instruction: Czech

Form of Study: full-time

Accredited from: 2019 Accredited till: 2029

Information for applicants

Profile

The primary goal of the study programme is to help students to understand the principles of security threats in information technology and appropriate security measures. Students will study basic security principles as well as they will understand the importance of security measures in large information systems. They will also know the principles of creating new solutions that lead to the design, installation, operation and maintenance of secure information systems. Mandatory subjects will provide further extension of knowledge that the students receive in the bachelors study programme - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics. By selecting an appropriate set of optional subjects, students can further extend their abilities of theoretic foundations in the field of formal specification and verification or to focus on more practical issues - for example embedded systems and hardware, software development and operation or computer networks and communications.

Guarantor
Occupational profiles of graduates with examples
  • The graduate will have a good knowledge of components and architectures of information systems with an emphasis on security components and security functions. The graduate will be able to integrate both the technical and software products used in secure information systems development. The graduate will have a solid knowledge (and the ability to apply) of security technologies and important standards that are essential for both the development and the operation of information systems.
  • The graduate will be ready to solve projects, operate and maintain information systems where one of the key issues is security. The graduate will also be prepared for further research and development of methods, tools and technologies for developing secure components, applications and large systems. The graduate understand principles of security maintenance and is able to apply these principles in development of computer systems and networks.
  • Specializations for profession: information systems projecting (or information systems in general), programmer, security architect, information systems maintenance, security administrator. The graduate of this study programme can use his/her knowledge in development and research departments as well as in institutions targeting on software system development with the primary concern on security. The graduate can also work in institutions that operate these information systems, e.g. government institutions and local administrations, in army, health service or any other industrial organizations.
Extent of the State Final Examinations

State Exam in Information Technology and Artificial Intelligence, specialization Cyber Security consists of the following parts:

  • presentation and defense of master's thesis,
  • oral exam, which combines the basic themes contained in the courses profiling the basis of Information Technology and Artificial Intelligence (Theoretical Computer Science, Statistics and Probability, Computer Systems Architectures, Artificial Intelligence and Machine Learning, Data Storage and Preparation, Functional and Logic Programming, Parallel and distributed algorithms, Modern trends in informatics),
  • oral exam, which combines the basic themes contained in the courses profiling the basis of Cyber Security (Advanced Information Systems, Cryptography, Secure Devices, Data Transfer, Computer Networks and Protocols, Biometric Systems, Information System Security).

All parts of the state examination are held on the same date before the State Examination Board. The state exam can be taken by a student who has obtained the required number of credits in the prescribed composition necessary for the successful completion of the master's degree and has submitted the master's thesis in due time. The organization and course of the state examination are given by the corresponding internal standard of the faculty and by the relevant instructions of the program guarantor for state examinations.

Examples of theses
  • Android App for Security Monitoring of Communication
  • Security Analysis of Mifare Classic Smart Cards
  • Security of Online Client-Server Applications
  • Secure Development Framework for Web Applications
  • Security Metrics of SAP Platform

Choose academic year and curriculum

1st year of study, winter semester

AbbrvTitleCredDutyComplFa
MSPStatistics and Probability6CCr+ExFME
TINTheoretical Computer Science7CCr+ExFIT

1st year of study, summer semester

AbbrvTitleCredDutyComplFa
FLPFunctional and Logic Programming5CCr+ExFIT
PRLParallel and Distributed Algorithms5CCr+ExFIT

2nd year of study, winter semester

AbbrvTitleCredDutyComplFa
SEPSemester Project5CClCrFIT
PP2Project Practice 25EClCrFIT

2nd year of study, summer semester

AbbrvTitleCredDutyComplFa
BZASecure Hardware Devices5CExFIT
DIPMaster's Thesis13CCrFIT

all years of study, winter semester

AbbrvTitleCredDutyComplFa
AVSComputation Systems Architectures5CCr+ExFIT
BIOBiometric Systems5CCr+ExFIT
BISInformation System Security5CCr+ExFIT
SUIArtificial Intelligence and Machine Learning5CExFIT
UPAData Storage and Preparation5CCr+ExFIT
AEUEnglish for Europe3ECr+ExFEEC
AGSAgents and Multiagent Systems5EExFIT
AISInformation Systems Analysis and Design5ECr+ExFIT
BAYaBayesian Models for Machine Learning (in English)5EExFIT
BMSWireless and Mobile Networks5ECr+ExFIT
CCSDesign and Security of Enterprise Networks5EClCrFIT
CZSaDigital Signal Processing (in English)5EExFIT
C1PImplementing Cisco IP Routing (ROUTE)5EClCrFIT
C2PImplementing Cisco IP Switched Networks (SWITCH) *)5EClCrFIT
C3PTroubleshooting and Maintaining Cisco IP Networks (TSHOOT) *)5EClCrFIT
EIPEconomics of Information Products *)5EExFIT
SAVStatic Analysis and Verification5ECr+ExFIT
FCEEnglish: Practical Course of Business Conversation and Presentation3ECrFIT
FIKPhilosophy and the Culture *)3ECrILL
FITHistory and Philosophy of Technology3ECrILL
GALGraph Algorithms5EExFIT
GJAGraphical User Interfaces in Java5ECr+ExFIT
GMUGraphic and Multimedia Processors5ECr+ExFIT
GUXGraphical User Interfaces in X Window System *)5EExFIT
GZNGraphical and Sound Interfaces and Standards5EExFIT
HKOCommunication and Presentation Skills3ECrFIT
HSCHardware/Software Codesign5ECr+ExFIT
HVRLeadership and Time Management3ECrFIT
JA3Conversation through Hot Current Issues3ECr+ExFEEC
MATMathematical Structures in Computer Science *)5EExFME
MOGMolecular Genetics3EExFCH
PBIAdvanced Bioinformatics4EExFIT
PCGParallel Computations on GPU5EExFIT
PCSAdvanced Digital Systems5EExFIT
PDBAdvanced Database Systems5ECr+ExFIT
PDIDistributed Application Environment5EExFIT
PGPaAdvanced Computer Graphics (in English)5EExFIT
PGRComputer Graphics5EExFIT
PKSAdvanced Communication Systems5ECr+ExFIT
POVaComputer Vision (in English)5EExFIT
PRMFundamentals of Law3ECrILL
RETRhetoric3ECrILL
ROBaRobotics (in English)5EExFIT
RTSaReal-Time Systems (in English)5EExFIT
SEMSensors and Measurement5ECr+ExFIT
SFCSoft Computing5ECr+ExFIT
SINIntelligent Systems5EExFIT
SLALinear Algebra6ECr+ExFME
SRIStrategic Management of Information Systems5EExFIT
TAMaApplication Development for Mobile Devices (in English)5EClCrFIT
THEGame Theory5ECr+ExFIT
VINComputer Art5EClCrFIT
VYPaCompiler Construction (in English)5EExFIT
ZPJaNatural Language Processing (in English) *)5EExFIT
ZPXProfessional Practice, Abroad5ECrFIT
ZZNKnowledge Discovery in Databases5ECr+ExFIT

all years of study, summer semester

AbbrvTitleCredDutyComplFa
KRYCryptography5CCr+ExFIT
MTIaModern Trends in Informatics (in English)4CClCrFIT
PDSData Communications, Computer Networks and Protocols5CExFIT
PISAdvanced Information Systems5CCr+ExFIT
ALGAlgebra5ECr+ExFME
PPPPractical Parallel Programming5ECr+ExFIT
ATAAutomated Testing and Dynamic Analysis5EExFIT
BIFBioinformatics5EExFIT
BINBio-Inspired Computers5EExFIT
CPSaCyber-Physical Systems Design (in English)5EExFIT
CSOaCCNA Cybersecurity Operations (in English)5EClCrFIT
C1PImplementing Cisco IP Routing (ROUTE) *)5EClCrFIT
C2PImplementing Cisco IP Switched Networks (SWITCH)5EClCrFIT
C3PTroubleshooting and Maintaining Cisco IP Networks (TSHOOT) *)5EClCrFIT
DFAaDigital Forensics (in English)5EExFIT
DJADynamic Languages5EExFIT
EVOApplied Evolutionary Algorithms5EExFIT
FIKPhilosophy and the Culture3ECrILL
FITHistory and Philosophy of Technology *)3ECrILL
FVSFunctional Verification of Digital Systems5EExFIT
FYOPhysical Optics5EExFEEC
GISGeographical Information Systems *)5ECr+ExFIT
HKOCommunication and Presentation Skills3ECrFIT
HVRLeadership and Time Management3ECrFIT
SURMachine Learning and Recognition5EExFIT
JA3Conversation through Hot Current Issues3ECr+ExFEEC
KKOData Coding and Compression5ECr+ExFIT
KNNConvolutional Neural Networks5EClCrFIT
LOGLogic5ECr+ExFME
MMATMatrices and Tensors Calculus5ECr+ExFEEC
MPRProject Management5ECr+ExFIT
MULMultimedia5EExFIT
NAVDesign of Embedded Systems5EExFIT
NSBProjecting, Administration and Security5ECr+ExFIT
MBAModel-Based Analysis5EExFIT
PMAProject Manager5EClCrFIT
POSAdvanced Operating Systems *)5EExFIT
PP1Project Practice 15ECrFIT
PRMFundamentals of Law3ECrILL
RETRhetoric3ECrILL
SLOaComplexity (in English)5EExFIT
SNTSimulation Tools and Techniques5ECr+ExFIT
SPPFault Tolerant Systems5ECr+ExFIT
TOIPrinciples and Design of IoT5ECr+ExFIT
UXIaUser Experience and Design of User Interfaces and Services (in English)5EClCrFIT
VGEComputational Geometry5EExFIT
VIZaVisualization and CAD (in English)5EClCrFIT
VNVHigh Performance Computations5EExFIT
VYFComputational Photography5EClCrFIT
WAPInternet Applications5ECr+ExFIT
ZPOImage Processing5EExFIT
ZPXProfessional Practice, Abroad5ECrFIT
ZRESpeech Signal Processing5EExFIT
Course is not open in this academic year
Compl: Course completion: Ex - examination, Cr - credit, ClCr - classified credit, Co - colloquium
Duty: C - compulsory, CEx - compulsory-elective group x, R - recommended, E - elective
Back to top