FI:PV210 Cybersec. in an Organization - Course Information
PV210 Cybersecurity in an Organization
Faculty of InformaticsAutumn 2021
- Extent and Intensity
- 2/0/2. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
- Teacher(s)
- doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
RNDr. Martin Laštovička, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer) - Guaranteed by
- doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Jan Vykopal, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Thu 16. 9. to Thu 9. 12. Thu 10:00–11:50 A218
- Prerequisites (in Czech)
- PV080 Inf. security and cryptography
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 60 student(s).
Current registration and enrolment status: enrolled: 3/60, only registered: 0/60, only registered with preference (fields directly associated with the programme): 0/60 - fields of study / plans the course is directly associated with
- Image Processing and Analysis (programme FI, N-VIZ)
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, B-INF) (2)
- Informatics (programme FI, D-IN4)
- Informatics in education (programme FI, B-IVV) (2)
- Information Security (programme FI, N-PSKB_A)
- Quantum and Other Nonclassical Computational Models (programme FI, N-TEI)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Networks and Communications (programme FI, N-PSKB)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Principles of programming languages (programme FI, N-TEI)
- Programming and development (programme FI, B-PVA)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Theoretical Informatics (programme FI, N-IN)
- Teacher of Informatics and IT administrator (programme FI, N-UCI)
- Informatics for secondary school teachers (programme FI, N-UCI) (2)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Computer Games Development (programme FI, N-VIZ)
- Processing and analysis of large-scale data (programme FI, N-UIZD)
- Image Processing (programme FI, N-AP)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- The general objective of the course is to introduce the role and services of a Computer Security Incident Response Team (CSIRT) in an organization. The course covers specific knowledge and skills required for the work role of Cyber Defense Incident Responder as defined by the NICE Cybersecurity Workforce Framework (see https://niccs.cisa.gov/workforce-development/cyber-security-workforce-framework/incident-response and PR-CIR-001).
- Learning outcomes
- At the end of the course, a student should be able to:
- understand the role and basic services of a CSIRT;
- perform cyber defense incident triage;
- track and document cyber defense incidents from initial detection through final resolution;
- coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents;
- coordinate incident response functions;
- write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies;
- collect intrusion artifacts and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise;
- monitor external data sources to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise;
- Syllabus
- Computer Security Incident Response Team (CSIRT) and its role.
- Recognizing and categorizing types of vulnerabilities and associated attacks.
- Incident handling phases.
- Attack detection.
- Security advisories.
- Attack defense and impact.
- Cyber defense and information security policies, procedures, and regulations.
- Legal aspects.
- Introduction to forensic analysis.
- Table-top exercises on topics covered in the semester.
- Literature
- FIRST CSIRT Services Framework. 2019. URL: https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1.
- ENISA. Good Practice Guide for Incident Management. 2010. URL: https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management.
- Teaching methods
- Flipped classroom: highly interactive classes exercising topics studied at home, reading or homework before each class, table-top exercises at the end of the course.
- Assessment methods
- Homework assignments during the semester, active participation in table-top exercises at the end of the course.
- Language of instruction
- Czech
- Follow-Up Courses
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually. - Teacher's information
- All material and assignments will be provided primarily in English.
- Enrolment Statistics (Autumn 2021, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2021/PV210