Course: Computer Criminality (Cybernality)

« Back
Course title Computer Criminality (Cybernality)
Course code UAI/717
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study not specified
Frequency of the course In each academic year, in the winter semester.
Semester Winter
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory, Compulsory-optional
Form of instruction unspecified
Work placements unspecified
Recommended optional programme components None
Lecturer(s)
  • Břehovský Petr, Ing.
Course content
Content of lectures: 1. Sum up legal aspects of illegal activities in IT environment 2. Types and forms of attacks, their signs and possible protection 3. WEB servers and applications attacks 4. Network eavesdropping and hijacking 5. Malware 6. WiFi security 7. Anonymous communication 8. Principles of safe behavior on the Internet Content of practice: " Practical demonstrations of interesting attacks " Adoption of some attacks by students " Adoption of basic security tools

Learning activities and teaching methods
Dialogic (discussion, interview, brainstorming), Demonstration, Laboratory
  • Preparation for classes - 29 hours per semester
  • Class attendance - 42 hours per semester
  • Preparation for exam - 29 hours per semester
Learning outcomes
Go through main principles of computer attacks and a defense against
Students will understand basic principles of cyber attacks and will know, how to prevent them. Students will be able to use basic security tools for testing security of IT infrastructure
Prerequisites
Recommended knowledge: TCP/IP protocols. Application protocols: HTTP/S, SMTP, DNS SQL query structure Basics of some scripting language (Python, Bash, JavaScript, Ruby) Asymmetric cryptography. Basics of Linux and Windows operating systems Virtualization tool Virtualbox

Assessment methods and criteria
Oral examination

Practical demonstration of learned attacks and procedures.
Recommended literature
  • Lasser, J: Rozumíme Unixu, Computer Press, 2002.
  • Erickson. Hacking umění exploitace. 2005. ISBN 1-559327-007-0.
  • Huseby. Zranitelný kód. 2006. ISBN 80-251-1180-6.
  • Kurtz, McClure, Scambray. Hacking bez tajemství. 2003. ISBN 80-722-6948-8.
  • McClure, Shah. WEB Hacking. 2003. ISBN 80-86497-53-4.
  • Szor. Počítačové viry. 2006. ISBN 80-86815-04-8.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Informatics for future teachers (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Informatics (1) Category: Informatics courses - Recommended year of study:-, Recommended semester: Winter