branch detail

Information Technology Security

Original title in Czech: Bezpečnost informačních technologiíFITAbbreviation: MBSAcad. year: 2017/2018Specialisation: -

Programme: Information Technology

Length of Study: 2 years

Accredited from: 30.6.2014Accredited until: 31.12.2022

Profile of the branch

The primary goal of the study programme is to help students to understand the principles of security threats in information technology and appropriate security measures. Students will study basic security principles as well as they will understand the importance of security measures in large information systems. They will also know the principles of creating new solutions that lead to the design, installation, operation and maintenance of secure information systems. Mandatory subjects will provide further extension of knowledge that the students receive in the bachelors study programme - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics. By selecting an appropriate set of optional subjects, students can further extend their abilities of theoretic foundations in the field of formal specification and verification or to focus on more practical issues - for example embedded systems and hardware, software development and operation or computer networks and communications.

Key learning outcomes

Student of the branch acquire deeper knowledge in the information technology security. This give him knowledge and skills base to analyse, design and verification of problems of security threats in information technology and appropriate security measures. Study in this branch also provide further extension of knowledge that the students receive in the bachelors study program - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics.

Occupational profiles of graduates with examples


  • The graduate will have a good knowledge of components and architectures of information systems with an emphasis on security components and security functions. The graduate will be able to integrate both the technical and software products used in secure information systems development. The graduate will have a solid knowledge (and the ability to apply) of security technologies and important standards that are essential for both the development and the operation of information systems.
  • The graduate will be ready to solve projects, operate and maintain information systems where one of the key issues is security. The graduate will also be prepared for further research and development of methods, tools and technologies for developing secure components, applications and large systems. The graduate understand principles of security maintenance and is able to apply these principles in development of computer systems and networks.
  • Specializations for profession: information systems projecting (or information systems in general), programmer, security architect, information systems maintenance, security administrator. The graduate of this study programme can use his/her knowledge in development and research departments as well as in institutions targeting on software system development with the primary concern on security. The graduate can also work in institutions that operate these information systems, e.g. government institutions and local administrations, in army, health service or any other industrial organizations.

Programme supervisor


Course structure diagram with ECTS credits

1. year of study, winter semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
MATMathematical Structures in Computer Sciencecs5winterCompulsoryExyes
TINTheoretical Computer Sciencecs5winterCompulsoryAc,Exyes
HSCHardware/Software Codesigncs5winterCompulsory-optionalAc,Exyes
STITheoretical Computer Science Seminarcs2winterOptionalAcyes
1. year of study, summer semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
FLPFunctional and Logic Programmingcs5summerCompulsoryAc,Exyes
KKOData Coding and Compressioncs5summerCompulsoryAc,Exyes
PRLParallel and Distributed Algorithmscs5summerCompulsoryAc,Exyes
PDSData Communications, Computer Networks and Protocolscs5summerCompulsoryExyes
2. year of study, winter semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
BIOBiometric Systemscs5winterCompulsoryAc,Exyes
SEPTerm Projectcs5winterCompulsoryClAcyes
2. year of study, summer semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
DIPMaster's Thesiscs13summerCompulsoryAcyes
KRYCryptographycs5summerCompulsoryAc,Exyes
NSBProjecting, Administration and Securitycs5summerCompulsoryAc,Exyes
0. year of study, winter semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
BISInformation System Securitycs5winterCompulsoryAc,Exyes
AISInformation Systems Analysis and Designcs5winterCompulsory-optionalAc,Exyes
FCEEnglish: Preparatory Course for FCE Examcs3winterCompulsory-optionalAcyes
ACHProcessor Architecturecs5winterCompulsory-optionalAc,Exyes
BMSWireless and Mobile Networkscs5winterCompulsory-optionalAc,Exyes
FITHistory and Philosophy of Technologycs3winterCompulsory-optionalAcyes
FAVFormal Analysis and Verificationcs5winterCompulsory-optionalAc,Exyes
SENIntelligent Sensorscs5winterCompulsory-optionalAc,Exyes
HKOCommunication Skillscs3winterCompulsory-optionalAcyes
HKAAssertiveness and Conflictscs3winterCompulsory-optionalAcyes
PKSAdvanced Communication Systemscs5winterCompulsory-optionalAc,Exyes
PRMFundamentals of Lawcs3winterCompulsory-optionalAcyes
HPRPresentation Skillscs3winterCompulsory-optionalAcyes
HPOPersonality Psychologycs3winterCompulsory-optionalAcyes
RETRhetoriccs3winterCompulsory-optionalAcyes
HVRLeadership and People Managementcs3winterCompulsory-optionalAcyes
ZZNKnowledge Discovery in Databasescs5winterCompulsory-optionalAc,Exyes
EIPEconomics of Information Productscs5winterOptionalExyes
GZNGraphical and Sound Interfaces and Standardscs5winterOptionalExyes
GJAGraphical User Interfaces in Javacs5winterOptionalAc,Exyes
GUXGraphical User Interfaces in X Window Systemcs5winterOptionalExyes
GMUGraphic and Multimedia Processorscs5winterOptionalAc,Exyes
GALGraph Algorithmscs5winterOptionalExyes
SINIntelligent Systemscs5winterOptionalExyes
MOBModelling of Biological Systemscs4winterOptionalAc,Exyes
PGRComputer Graphicscs5winterOptionalExyes
POVaComputer Visionen5winterOptionalExyes
PGPaAdvanced Computer Graphicsen5winterOptionalExyes
PCSAdvanced Digital Systemscs5winterOptionalExyes
PDBAdvanced Database Systemscs5winterOptionalAc,Exyes
PDIDistributed Application Environmentcs5winterOptionalExyes
ROBaRoboticsen5winterOptionalExyes
SMTSeminar of Mathematical Structurescs2winterOptionalAcyes
SFCSoft Computingcs5winterOptionalAc,Exyes
SRIStrategic Management of Information Systemscs5winterOptionalExyes
THEGame Theorycs4winterOptionalAc,Exyes
TAMaApplication Development for Mobile Devicesen5winterOptionalClAcyes
VYPaCompiler Constructionen5winterOptionalExyes
VINComputer Artcs5winterOptionalClAcyes
ZPXProfessional Practice, Abroaden5winterOptionalAcyes
ZPJaNatural Language Processingen5winterOptionalExyes
0. year of study, summer semester
CodeTitleL.Cr.Sem.Com.Compl.Gr.Op.
PISAdvanced Information Systemscs5summerCompulsoryAc,Exyes
DJADynamic Languagescs5summerCompulsory-optionalExyes
FIKPhilosophy and the Culturecs3summerCompulsory-optionalAcyes
WAPInternet Applicationscs5summerCompulsory-optionalAc,Exyes
HKOCommunication Skillscs3summerCompulsory-optionalAcyes
HKAAssertiveness and Conflictscs3summerCompulsory-optionalAcyes
NAVDesign of External Adapters and Embedded Systemscs5summerCompulsory-optionalExyes
POSAdvanced Operating Systemscs5summerCompulsory-optionalExyes
PRMFundamentals of Lawcs3summerCompulsory-optionalAcyes
HPRPresentation Skillscs3summerCompulsory-optionalAcyes
HPOPersonality Psychologycs3summerCompulsory-optionalAcyes
RETRhetoriccs3summerCompulsory-optionalAcyes
SNTSimulation Tools and Techniquescs5summerCompulsory-optionalAc,Exyes
SPPFault Tolerant Systemscs5summerCompulsory-optionalAc,Exyes
HVRLeadership and People Managementcs3summerCompulsory-optionalAcyes
AGSAgents and Multiagent Systemscs5summerOptionalExyes
EVOApplied Evolutionary Algorithmscs5summerOptionalExyes
ARCParallel System Architecture and Programmingcs5summerOptionalAc,Exyes
BIFBioinformaticscs5summerOptionalExyes
BINBio-Inspired Computerscs5summerOptionalExyes
FVSFunctional Verification of Digital Systemscs5summerOptionalExyes
FYOPhysical Opticscs5summerOptionalExyes
LOGLogiccs5summerOptionalAc,Exyes
MPRProject Managementcs5summerOptionalAc,Exyes
MEKEconomics for Managerscs5summerOptionalAc,Exyes
MARMarketingcs5summerOptionalAc,Exyes
MMATMatrices and Tensors Calculuscs5summerOptionalAc,Exyes
MULMultimediacs5summerOptionalExyes
OPMOptimizationcs4summerOptionalAc,Exyes
PESPetri Netscs5summerOptionalExyes
PMAProject Managercs5summerOptionalClAcyes
ROSaReal-Time Operating Systemsen5summerOptionalExyes
SLOaComplexityen5summerOptionalExyes
SSPStochastic Processescs4summerOptionalAc,Exyes
STMStrategic Managementcs5summerOptionalAc,Exyes
VIZaVisualization and CADen5summerOptionalClAcyes
VYFComputational Photographycs5summerOptionalClAcyes
VGEComputational Geometrycs5summerOptionalExyes
VNVHigh Performance Computationscs5summerOptionalExyes
MZSAdvanced Methods of Signal Processingcs6summerOptionalAc,Exyes
ZPXProfessional Practice, Abroaden5summerOptionalAcyes
ZPOImage Processingcs5summerOptionalExyes
ZRESpeech Signal Processingcs5summerOptionalExyes