FI:PV276 Seminar on Cyber Attacks - Course Information
PV276 Seminar on Simulation of Cyber AttacksFaculty of Informatics
- Extent and Intensity
- 0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
- RNDr. Jan Vykopal, Ph.D. (lecturer)
Mgr. Jakub Bartolomej Košuth (lecturer)
RNDr. Valdemar Švábenský (seminar tutor)
RNDr. Milan Čermák, Ph.D. (assistant)
RNDr. Martin Laštovička (assistant)
- Guaranteed by
- RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications - Faculty of Informatics
- Timetable of Seminar Groups
- PV276/Fundamentals: Mon 17. 2. to Fri 15. 5. Thu 10:00–11:50 S108, J. Košuth, V. Švábenský, J. Vykopal
- Prerequisites (in Czech)
- ( PB156 Computer Networks && PV004 UNIX ) || SOUHLAS
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 24 student(s).
Current registration and enrolment status: enrolled: 5/24, only registered: 0/24, only registered with preference (fields directly associated with the programme): 0/24
- fields of study / plans the course is directly associated with
- Image processing and analysis (programme FI, N-VIZ)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Informatics (programme FI, B-INF) (2)
- Informatics in education (programme FI, B-IVV) (2)
- Information Security (programme FI, N-PSKB_A)
- Quantum and other nonclassical computational models (programme FI, N-TEI)
- Networks and Communication (programme FI, N-PSKB_A)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Networks and communication (programme FI, N-PSKB)
- Principles of programming languages (programme FI, N-TEI)
- Programming and development (programme FI, B-PVA)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Teacher of Informatics and IT administrator (programme FI, N-UCI)
- Informatics for secondary school teachers (programme FI, N-UCI) (2)
- Digital Game Development (programme FI, N-VIZ)
- Big data (programme FI, N-UIZD)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- The course enables students to learn cybersecurity topics practically. Students will learn standard attack techniques as well as detection and prevention methods in a simulated environment of KYPO cyber range. These skills will be exercised in the preparation of a cybersecurity game, which the student teams will present at a public event.
- Learning outcomes
- At the end of the course, students will be able to:
• understand current cybersecurity threats,
• conduct penetration testing using suitable tools,
• apply suitable methods of detection and prevention of vulnerabilities,
• create a virtual environment with selected vulnerabilities of computer systems and applications,
• create a cybersecurity game in KYPO cyber range.
- The course has two parts.
- The first part introduces selected topics of cybersecurity, including attack types and techniques, network traffic analysis, forensic analysis, and prevention methods.
- In the second part, teams of students prepare cybersecurity games at KYPO cyber range.
- The created games are publicly presented at the end of the semester.
- Mike O’Leary. 2019. Cyber Operations: Building, Defending, and Attacking Modern Computer Networks (2nd ed.). Apress, USA.
- Teaching methods
- Hands-on seminars, homework assignments, and a team project (cybersecurity game). Public presentation at the end of the semester.
- Assessment methods
- Homework assignments (at least 50 % of all marks). Team project and its presentation.
- Language of instruction
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually.
- Teacher's information
- The course has two seminar groups. The "Fundamentals" group focuses on IT security whereas the "ICS" group deals with the security of industrial control systems (ICS). The limit of number of enrolled students is 18 for the "Fundamentals" group and 6 for the "ICS" group.