PA211 Cybersecurity Operations

Faculty of Informatics
Spring 2026
Extent and Intensity
1/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
In-person direct teaching
Teacher(s)
prof. Ing. Pavel Čeleda, Ph.D. (lecturer)
doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
Ing. Benjamin Král (lecturer)
Guaranteed by
prof. Ing. Pavel Čeleda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 17. 2. to Tue 12. 5. Tue 12:00–12:50 A318
  • Timetable of Seminar Groups:
PA211/01: Wed 18. 2. to Wed 13. 5. Wed 14:00–15:50 A219, P. Čeleda, J. Vykopal
PA211/02: Thu 19. 2. to Thu 14. 5. Thu 8:00–9:50 A219, P. Čeleda, J. Vykopal
PA211/03: Wed 18. 2. to Wed 13. 5. Wed 10:00–11:50 A219, P. Čeleda, J. Vykopal
PA211/04: Wed 18. 2. to Wed 13. 5. Wed 8:00–9:50 A219, P. Čeleda, J. Vykopal
Prerequisites (in Czech)
PB177 Cyber Attacks || PV276 Seminar on Cyber Attacks
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 60 student(s).
Current registration and enrolment status: enrolled: 54/60, only registered: 21/60, only registered with preference (fields directly associated with the programme): 11/60
fields of study / plans the course is directly associated with
there are 8 fields of study the course is directly associated with, display
Abstract
The general objective of the course is to introduce topics of cybersecurity operations in an organization. The course covers specific knowledge and skills required for the work role of Cyber Defense Infrastructure Support Specialist (PR-INF-001), Systems Security Analyst (OM-ANA-001), and Vulnerability Assessment Analyst (PR-VAM-001) as defined by the NICE Cybersecurity Workforce Framework (see https://niccs.cisa.gov/workforce-development/cyber-security-workforce-framework/).
Learning outcomes
At the end of the course, a student should be able to:
conduct vulnerability scans and recognize vulnerabilities in systems and applications,
conduct authorized penetration testing on enterprise network and applications,
apply selected countermeasures to harden (secure) networks, operating systems, and applications.
Key topics
  • Asset management.
  • Vulnerability management.
  • Threat management.
  • Penetration testing – introduction, process, report and presentation.
  • Hardening of operating system, and applications.
Study resources and literature
  • NIST. National Checklist Program (NCP), 2022. https://ncp.nist.gov/repository
  • The Center for Internet Security. CIS Benchmarks, 2022. https://www.cisecurity.org/cis-benchmarks/
  • OWASP. OWASP Web Security Testing Guide, 2022. https://owasp.org/www-project-web-security-testing-guide/
  • TEVAULT, Donald A. Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats. Packt Publishing Ltd, 2020.
  • J. Muniz, G. McIntyre, and N. AlFardan, Security Operations Center: Building, Operating, and Maintaining Your SOC. Cisco Press, 2015.
Approaches, practices, and methods used in teaching
Lectures, weekly seminars, homework assignments during the semester.
Method of verifying learning outcomes and course completion requirements
Assignments during the semester (60 %), practical exam (40 %).
Language of instruction
English
Further comments (probably available only in Czech)
The course is taught annually.
Teacher's information
The course will be taught in Spring semesters only.
The course is also listed under the following terms Spring 2016, Spring 2017, Spring 2018, Spring 2019, Autumn 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/fi/spring2026/PA211