Security of IT systems 1000-OG-EN-SITS
• Types of network security: Firewalls, Email security, Antivirus and antimalware protection, Cloud Security, Mobile device security, etc.
• Cybersecurity threats: Phishing, Ransomware, Malware, Social engineering, Denial-of-service (DoS) attacks, Man-in-the-middle (MitM) attacks
• Email security, Email spoofing, Money scams, Email Encryption, Spam
• Application security, Computer viruses, antivirus and antimalware protection, Data loss prevention
• User Authentication and Authorisation, Encryption, VPN
• Web security, Wireless network security
• Internet of Things devices (IoT devices), Smart Home, Smartphones and Cloud Security
• Social engineering methods
Total student workload
Learning outcomes - knowledge
Learning outcomes - skills
Learning outcomes - social competencies
Teaching methods
Observation/demonstration teaching methods
Expository teaching methods
- informative (conventional) lecture
- discussion
Exploratory teaching methods
- situational
Online teaching methods
- evaluative methods
- methods referring to authentic or fictitious situations
- methods developing reflexive thinking
Prerequisites
Course coordinators
Term 2023/24L: | Term 2025/26Z: | Term 2022/23L: | Term 2024/25Z: |
Assessment criteria
Assessment methods:
Lectures - written examination - W1, W2, W3, K1, K2
Laboratory - test - U1, U2, U3, U4, K1, K2
Assessment criteria:
fail: 0% - 39%
satisfactory: 40% - 49%
satisfactory plus: 50% - 59%
good: 60% - 69%
good plus: 70% - 79%
very good: 80% - 100%
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: