Přístupnostní navigace
E-application
Search Search Close
Course detail
FEKT-MBISAcad. year: 2012/2013
Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview in possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
branch M-TIT , 1 year of study, winter semester, elective specialisedbranch M-KAM , 2 year of study, winter semester, elective interdisciplinary
branch EE-FLE , 1 year of study, winter semester, elective specialised
Lecture
Teacher / Lecturer
Syllabus
Fundamentals seminar