PV297 Cybersecurity Training

Faculty of Informatics
Spring 2025
Extent and Intensity
1/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Jan Vykopal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites (in Czech)
( PB177 Cyber Attacks || ( PB156 Computer Networks && PV004 UNIX ) ) && ! PV276 Seminar on Cyber Attacks
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 15 student(s).
Current registration and enrolment status: enrolled: 0/15, only registered: 0/15, only registered with preference (fields directly associated with the programme): 0/15
fields of study / plans the course is directly associated with
Course objectives
Introduce students to various forms of education in cybersecurity - raising awareness, technical and communication skills training, and exercises. Practice creating educational materials including pilot testing with users.
Learning outcomes
Upon completion of the course, students should be able to:
  • describe various forms of cybersecurity education and explain the differences between them,
  • design and implement a chosen form of education - either a game for teaching technical skills or an exercise for organizational response to a cybersecurity incident,
  • evaluate the pilot run of the designed game or exercise.
  • Syllabus
    • Types of cybersecurity education: raising awareness, technical and communication skills training. Examples of each type.
    • Environment and tools for implementing cybersecurity education.
    • Lifecycle of exercises. Phases of preparation, testing, delivery, and evaluation.
    • Design and preparation of exercises in teams. Ongoing consultations.
    • Internal testing of the created exercise by students of the course.
    • Pilot testing of the created exercise by peers, and the general public.
    • Methods of exercise evaluation, formulation of improvement suggestions.
    Literature
    • FIRST CSIRT Services Framework. https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1
    • Methods for Designing Educational Cybersecurity Games. https://is.muni.cz/auth/th/uovmy/
    Teaching methods
    Lecture, seminar, and semestral team project with several milestones.
    Assessment methods
    Continuous assessment of the semestral project. Delivery of a created exercise at the end of the semester. Incorporation of feedback from exercise participants.
    Language of instruction
    Czech
    Further comments (probably available only in Czech)
    The course is taught annually.
    The course is taught: every week.
    Teacher's information
    Course materials and assignments are mainly in English but the course is taught in Czech. Possible topics for the created exercises: exploiting and mitigating a recently discovered vulnerability in widely used open-source software, securing a specific application exposed to the Internet, practicing incident handling processes.

    • Permalink: https://is.muni.cz/course/fi/spring2025/PV297