PB177 Cyber Attacks

Faculty of Informatics
Autumn 2025
Extent and Intensity
1/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching
Teacher(s)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
prof. Ing. Pavel Čeleda, Ph.D. (lecturer)
Adrián Kráľovský (seminar tutor)
Guaranteed by
doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Wed 17. 9. to Wed 10. 12. Wed 10:00–10:50 A318
  • Timetable of Seminar Groups:
PB177/01: Thu 18. 9. to Thu 11. 12. each even Thursday 8:00–9:50 A219, P. Čeleda
PB177/02: Fri 19. 9. to Fri 12. 12. each even Friday 10:00–11:50 A219, J. Vykopal
PB177/03: Thu 18. 9. to Thu 11. 12. each even Thursday 10:00–11:50 A219, P. Čeleda
PB177/04: Wed 17. 9. to Wed 10. 12. each even Wednesday 16:00–17:50 A219, J. Vykopal
PB177/05: Thu 25. 9. to Thu 18. 12. each odd Thursday 8:00–9:50 A219, P. Čeleda
PB177/06: Fri 26. 9. to Fri 19. 12. each odd Friday 10:00–11:50 A219, J. Vykopal
PB177/07: Wed 24. 9. to Wed 17. 12. each odd Wednesday 16:00–17:50 A219, A. Kráľovský
Prerequisites (in Czech)
PB156 Computer Networks && PB156cv Computer Networks - practicals && PV004 UNIX && ! PV276 Seminar on Cyber Attacks
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 100 student(s).
Current registration and enrolment status: enrolled: 104/100, only registered: 6/100, only registered with preference (fields directly associated with the programme): 1/100
fields of study / plans the course is directly associated with
Course objectives
Introduce students to the lifecycle of cyber attacks and typical attack actions within the corporate network environment, including their taxonomies. Practice executing attacks and explore options for their analysis and defense in a secure environment.
Learning outcomes
Upon completion of the course, students should be able to:
  • describe the lifecycle of a cyber attack,
  • understand frameworks and taxonomies of attack actions,
  • practically execute selected actions, analyze them, and defend against them.
  • Syllabus
    • Weakness, vulnerability, threat, event, attack, incident.
    • Lifecycle of cyber attacks, MITRE ATT&CK® framework, and Cyber Kill Chain. Advanced Persistent Threat (APT). MITRE D3FEND™ and MITRE ENGAGE™.
    • Use cases of the MITRE ATT&CK® framework.
    • Typical attack techniques within the MITRE ATT&CK® framework.
    • Real-life examples of the use of attack techniques. Defense possibilities using host-level and network-level measures.
    • Attacks and campaigns by organized groups utilizing APT.
    • Penetration testing.
    Literature
    • Lockheed Martin. Cyber Kill Chain®. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
    • MITRE ENGAGE™. https://engage.mitre.org.
    • MITRE D3FEND™. https://d3fend.mitre.org.
    • MITRE ATT&CK Matrix for Enterprise. https://attack.mitre.org.
    Teaching methods
    Lecture. Hand-on labs in a virtual environment. Homework assignments.
    Assessment methods
    Quizzes at the beginning of the lab sessions, homework assignments during a semester, and hands-on exam in a virtual environment.
    Language of instruction
    Czech
    Follow-Up Courses
    Further comments (probably available only in Czech)
    Study Materials
    The course is taught annually.
    Listed among pre-requisites of other courses
    Teacher's information
    All course materials and assignments are primarily in English, but the course is taught in Czech.
    The course is also listed under the following terms Autumn 2024.
    • Enrolment Statistics (recent)
    • Permalink: https://is.muni.cz/course/fi/autumn2025/PB177