FI:PB177 Cyber Attacks - Course Information
PB177 Cyber Attacks
Faculty of InformaticsAutumn 2025
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching - Teacher(s)
- doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
prof. Ing. Pavel Čeleda, Ph.D. (lecturer)
Adrián Kráľovský (seminar tutor) - Guaranteed by
- doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 17. 9. to Wed 10. 12. Wed 10:00–10:50 A318
- Timetable of Seminar Groups:
PB177/02: Fri 19. 9. to Fri 12. 12. each even Friday 10:00–11:50 A219, J. Vykopal
PB177/03: Thu 18. 9. to Thu 11. 12. each even Thursday 10:00–11:50 A219, P. Čeleda
PB177/04: Wed 17. 9. to Wed 10. 12. each even Wednesday 16:00–17:50 A219, J. Vykopal
PB177/05: Thu 25. 9. to Thu 18. 12. each odd Thursday 8:00–9:50 A219, P. Čeleda
PB177/06: Fri 26. 9. to Fri 19. 12. each odd Friday 10:00–11:50 A219, J. Vykopal
PB177/07: Wed 24. 9. to Wed 17. 12. each odd Wednesday 16:00–17:50 A219, A. Kráľovský - Prerequisites (in Czech)
- PB156 Computer Networks && PB156cv Computer Networks - practicals && PV004 UNIX && ! PV276 Seminar on Cyber Attacks
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 100 student(s).
Current registration and enrolment status: enrolled: 104/100, only registered: 6/100, only registered with preference (fields directly associated with the programme): 1/100 - fields of study / plans the course is directly associated with
- Cybersecurity (programme FI, B-CS)
- Course objectives
- Introduce students to the lifecycle of cyber attacks and typical attack actions within the corporate network environment, including their taxonomies. Practice executing attacks and explore options for their analysis and defense in a secure environment.
- Learning outcomes
- Upon completion of the course, students should be able to:
- describe the lifecycle of a cyber attack,
- understand frameworks and taxonomies of attack actions,
- practically execute selected actions, analyze them, and defend against them.
- Syllabus
- Weakness, vulnerability, threat, event, attack, incident.
- Lifecycle of cyber attacks, MITRE ATT&CK® framework, and Cyber Kill Chain. Advanced Persistent Threat (APT). MITRE D3FEND™ and MITRE ENGAGE™.
- Use cases of the MITRE ATT&CK® framework.
- Typical attack techniques within the MITRE ATT&CK® framework.
- Real-life examples of the use of attack techniques. Defense possibilities using host-level and network-level measures.
- Attacks and campaigns by organized groups utilizing APT.
- Penetration testing.
- Literature
- Lockheed Martin. Cyber Kill Chain®. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
- MITRE ENGAGE™. https://engage.mitre.org.
- MITRE D3FEND™. https://d3fend.mitre.org.
- MITRE ATT&CK Matrix for Enterprise. https://attack.mitre.org.
- Teaching methods
- Lecture. Hand-on labs in a virtual environment. Homework assignments.
- Assessment methods
- Quizzes at the beginning of the lab sessions, homework assignments during a semester, and hands-on exam in a virtual environment.
- Language of instruction
- Czech
- Follow-Up Courses
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- PA211 Cybersecurity Operations
PB177|| PV276 - PV297 Cybersecurity Training
( PB177 || (PB156 && PV004) ) && !PV276
- PA211 Cybersecurity Operations
- Teacher's information
- All course materials and assignments are primarily in English, but the course is taught in Czech.
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/fi/autumn2025/PB177