FEL_250 Introduction to Security
Code: | FEL_250 |
---|---|
Name: | Introduction to Security |
Department: | Faculty of Electrical Engineering |
Duration in hours: | 42 lesson hours |
Form of study: | Part-time |
Instruction language: | TBA |
Institution that granted the accreditation: | Czech Technical University in Prague |
Mode of delivery: | Lecture and Tutorial |
Mode of completion: | Final exam |
Mode of completion detail: | Final exam (can be taken online) |
Lecturer: | |
Supervisor: | doc. Ing. Tomáš Pevný, Ph.D. (pevnytom@fel.cvut.cz) |
Minimum educational requirement: | Primary (Základní vzdělání) |
Other prerequsites: | Please see the full list of requirements indicated below |
Annotation: | About The Introduction to Cybersecurity Master class is a 14-week intensive hands-on course to foster knowledge about penetration testing and advanced cyber defenses. From basic security principles to advanced attacks, you will learn to attack in an isolated cyber range and learn how to detect and stop advanced intruders. The online version is free and gives you access to live classes, recordings, and a cyber range to practice what is taught during the lessons. This course is part of the Open Informatics Master, taught at the Czech Technical University in Prague. The course is taught by members of the Stratosphere Laboratory in the AI Center, Computer Science Department, Faculty of Electrical Engineering, Czech Technical University in Prague. Prerequisites
What students will be provided with?
What should students bring?
How to take the class? Students registered through this portal can take the class online or in person. Whether online or in person,
|
Structure: | Classes are held weekly on Thursdays from 14:30 to 17:45 CEST. Each lecture is recorded, and you can watch it anytime. The topics covered are as follows: • Basic concepts in cybersecurity, an overview of protocols and their properties • Network reconnaissance, scanning, and basic network analysis • Attacking devices in the network, vulnerabilities, exploits • Detection of attacks, hardening user access, host-based IDS • Virtualization, sandboxing, honeypots, and threat intelligence • Privilege escalation, persistence, side-channel attacks • Binary exploitation & secure coding • Binary reversing, static & dynamic code analysis • Malware, C&C channels, denial of service attacks • Malware detection, packet analysis, netflows, and machine learning for cybersecurity • Web attacks, browser security, practical aspects of cryptography |
Document: | Certificate |
Teaching aids: | 📚 Zalewski, M. (2005) Silence on the wire: a field guide to passive reconnaissance and indirect attacks 📚 Lyon, G. F. (2008) Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning 📚 Sanders, C. (2020) Intrusion Detection Honeypots: Detection Through Deception. Applied Network Defense. 📚 Chappel, L. (2012) Wireshark Network Analysis. 📚 Anderson, R. (2020) Security Engineering: A Guide to Building Dependable Distributed Systems 📚 Stuttard, D.; Pinto, M. (2011). The web application hackers handbook: Finding and exploiting security flaws. John Wiley and Sons. |
Date: | 25.09.2025 - 12.01.2026 |
Venue: | Praha, Online / Praha KN-E107 |
Price: | 50 000,00 CZK |
Note: | By officially registering in our class as a paid student, you are helping fund our class to make it better and allow us to offer it as a free open online course for those who cannot afford it. If you want to register online for free, head over to https://cybersecurity.bsy.fel.cvut.cz where information about free registration will be posted. You can take the class online for free without the following benefits:
|