440-4117/01 – Cyber Security I (KB I)

Gurantor departmentDepartment of TelecommunicationsCredits5
Subject guarantorprof. Ing. Miroslav Vozňák, Ph.D.Subject version guarantorprof. Ing. Miroslav Vozňák, Ph.D.
Study levelundergraduate or graduateRequirementCompulsory
Study languageCzech
Year of introduction2021/2022Year of cancellation2023/2024
Intended for the facultiesFEIIntended for study typesFollow-up Master
Instruction secured by
LoginNameTuitorTeacher giving lectures
BUR0193 Ing. Patrik Burdiak
REZ106 Ing. Filip Řezáč, Ph.D.
VOZ29 prof. Ing. Miroslav Vozňák, Ph.D.
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Credit and Examination 2+3
Part-time Credit and Examination 4+16

Subject aims expressed by acquired skills and competences

Learning outcomes are set so that students are able to identify, apply and solve problems in the field of advanced cyber security and understand in detail modern methods of securing metallic, wireless and optical communications.

Teaching methods

Experimental work in labs
Project work


The course will provide an explanation of advanced mechanisms for securing communication networks regardless of the transmission medium. The student will get acquainted with modern cryptographic tools and protocols, which they will learn to apply mainly in the practical level to new or existing network infrastructures.

Compulsory literature:

1. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5.

Recommended literature:

1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW 2. Ivan Ristic, Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications, 2014, ISBN-13: 978-1907117046

Way of continuous check of knowledge in the course of semester

Each student can get a maximum of 40 points during the semester, including: • semestral project 15 points, • realization of the essay 10 points, • laboratory exercises, 3x5 points.



Other requirements

The course places requirements on the student in the form of basic knowledge of working in Linux, knowledge of the basic principles of cyber security and advanced knowledge of network protocols.


Subject has no prerequisities.


Subject has no co-requisities.

Subject syllabus:

1. Introduction to security, history of network security, development and modern trends in security. 2. Distribution of modern ciphers - symmetric / asymmetric, block / stream, cipher modes, key distribution options - DH. 3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerabilities, implementation, use. 4. PKI - certificates, PGP, X.509, elliptic curves, digital signature. 5. SSL / TLS libraries - configurations and designs over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates. 6. SSH - version, description, advanced configuration - file exchange, traffic tunneling. 7. VPN - principle, TUN / TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard. 8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, signature-based traffic analysis, advanced behavioral analysis from NetFlow. 9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE. 10. Authentication, multifactor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on (SSO) systems. 11. Selected parts of biometric authentication. 12. Interferometry, Raman, Brillouin and Rayleigh scattering and the use of fiber optic sensors in security applications. 13. Principles of key distribution using physical principles of quantum mechanics (QKD), protocols QKD - BB84, SARG04 and E91, QKD in quantum networks. 14. Introduction to penetration and performance testing - security auditing, testing methodologies and security analysis and certification - Common Criteria, JISE, FIPS, EAL.

Conditions for subject completion

Full-time form (validity from: 2022/2023 Winter semester, validity until: 2023/2024 Summer semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of pointsMax. počet pokusů
Credit and Examination Credit and Examination 100 (100) 51
        Credit Credit 40 (40) 25
                Projekt Project 15  0
                Referát/esej Other task type 10  0
                Laboratorní úloha 1 Laboratory work 5  0
                Laboratorní úloha 2 Laboratory work 5  0
                Laboratorní úloha 3 Laboratory work 5  0
        Examination Examination 60 (60) 26 3
                Test Written examination 30  0
                Praktická část Other task type 20  0
                Ústní zkouška Oral examination 10  0
Mandatory attendence participation: There is no compulsory participation in the course.

Show history

Conditions for subject completion and attendance at the exercises within ISP: Completion of all mandatory tasks within individually agreed deadlines.

Show history

Occurrence in study plans

Academic yearProgrammeBranch/spec.Spec.ZaměřeníFormStudy language Tut. centreYearWSType of duty
2023/2024 (N0714A060020) Communication and Information Technology KIT P Czech Ostrava 1 Compulsory study plan
2023/2024 (N0714A060020) Communication and Information Technology KIT K Czech Ostrava 1 Compulsory study plan
2022/2023 (N0714A060020) Communication and Information Technology KIT P Czech Ostrava 1 Compulsory study plan
2022/2023 (N0714A060020) Communication and Information Technology KIT K Czech Ostrava 1 Compulsory study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner

Assessment of instruction

2023/2024 Winter
2022/2023 Winter