Course detail
Cyber Security Management
FP-IcsmKAcad. year: 2024/2025
The course "Cybersecurity Management" (IcsmK) focuses on security aspects in cyberspace and examines the basic elements of creating an organization's cybersecurity policy.
To introduce students to the main areas and directions in the implementation of security measures and to familiarize them with their principles.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Knowledge of IS security management issues and specifics of IS security management.
Completion of the course Information Security Management (ImibeK) and the follow-up course Management of Industry Solutions (ImorK).
Rules for evaluation and completion of the course
classified credit - is performed orally
Aims
Emphasis is also placed on gaining knowledge of current cybersecurity management methodologies in enterprise IS.
The aim of the course is to introduce students to the main areas and directions in the implementation of cyber security measures and to familiarize them with their principles.
Study aids
Prerequisites and corequisites
Basic literature
SEDLÁK, P, a KONEČNÝ, M.: Kybernetická (ne)bezpečnost. Problematika bezpečnosti v kyberprostoru. Brno. CERM. 2021. ISBN 978-80-7623-068-2. (CS)
SEDLÁK, P. a KONEČNÝ, M.: Případové studie řízení kybernetické bezpečnosti. Brno. CERM. 2024. ISBN 728-80-7623-126-9. (CS)
Recommended reading
KOLOUCH J.a BAŠTA P.: CyberSecurity. Praha. CZ NIC. 2019. ISBN 978-80-88168-34-8 (CS)
KOLOUCH J.:CyberCrime. Praha. CZ NIC. 2016. ISBN 978-80-88168-18-8 (CS)
Classification of course in study plans
- Programme MGR-IM-KS Master's 2 year of study, summer semester, compulsory-optional
Type of course unit
Guided consultation in combined form of studies
Teacher / Lecturer
Syllabus
1. Cyber security in terms
2. Critical infrastructure and Critical information infrastructure
3. Cyber hygiene
4. Privacy protection
5. Incident Management
6. Crisis management
7. Management of suppliers
8. Vulnerability Management
9. Threat Hunting
10. Attack surface management
11. Cybersecurity Management Tools
12. Cybersecurity Framework (Puzzle)