| Lecturer(s) | 
    |  | 
    | Course content | 
    | Content of lectures: 1. Sum up legal aspects of illegal activities in IT environment 2. Types and forms of attacks, their signs and possible protection 3. WEB servers and applications attacks 4. Network eavesdropping and hijacking 5. Malware 6. WiFi security 7. Anonymous communication 8. Principles of safe behavior on the Internet  Content of practice: " Practical demonstrations of interesting attacks " Adoption of some attacks by students " Adoption of basic security tools 
 
 | 
    | Learning activities and teaching methods | 
    | Dialogic (discussion, interview, brainstorming), Demonstration, Laboratory 
                    
                
                    
                    Preparation for classes
                        - 29 hours per semester
                    Class attendance
                        - 42 hours per semester
                    Preparation for exam
                        - 29 hours per semester
                     | 
    
    
        
        
            | Learning outcomes | 
        
            | Go through main principles of computer attacks and a defense against Students will understand basic principles of cyber attacks and will know, how to prevent them. Students will be able to use basic security tools for testing security of IT infrastructure
 
 | 
        
            | Prerequisites | 
        
            | Recommended knowledge: TCP/IP protocols. Application protocols: HTTP/S, SMTP, DNS SQL query structure Basics of some scripting language (Python, Bash, JavaScript, Ruby) Asymmetric cryptography. Basics of Linux and Windows operating systems Virtualization tool Virtualbox 
 
 | 
        
            | Assessment methods and criteria | 
        
            | Oral examination 
 Practical demonstration of learned attacks and procedures.
 
 | 
    
    | Recommended literature | 
    | 
            
                
                
                     Lasser, J: Rozumíme Unixu, Computer Press, 2002. 
                
                    Erickson. Hacking umění exploitace. Praha: Zoner Press.2005. Zoner Press, 2005. ISBN 1-559327-007-0.
                
                    Huseby,S. Zranitelný kód.Brno:Computer Press.2006. Brno, 2006. ISBN 80-251-1180-6.
                
                    KOLOUCH, J. Cybercrime. Praha: Edice CZ.NIC.2016.. Praha: Edice CZ.NIC, 2016. ISBN 978-80-88168-18-8.
                
                    Kurtz,G., McClure,S., Scambray,J. Hacking bez tajemství. Brno:Computer Press,2003. Brno, 2003. ISBN 80-722-6948-8.
                
                    McClure,S., Shah,S. WEB Hacking.Praha: Soft Press.2003. Praha, 2003. ISBN 80-86497-53-4.
                
                    Szor,P. Počítačové viry.Praha:Zoner Press.2006. Praha, 2006. ISBN 80-86815-04-8.
                 
 
 |