Original title in Czech: Informační technologieFITAbbreviation: IT-MGR-2Acad. year: 2017/2018Level of course unit: Master's
Title awarded: Ing.
Level of qualification: Master's (2nd cycle)
Qualification awarded: Ing. in the field "Information Technology"
Specific admission requirements
Precondition to be accepted to the Follow-Up Master Study Program is to pass a bachelor or master study program at some university and to pass an entrance examination in specified subjects with specified minimum mark structure.
Profile of the programme
Master study program Information Technology broads and deepens knowledge and skills of bachelors degree study programs focused to informatics or information technology. Student of the Follow-Up Master Study Program acquire deeper knowledge in a chosen branch of study and will give him user and designer skills needed to be successful creative worker in the appropriate information technology branch, namely information systems and their security and safety, intelligent systems, computer systems, networks and communications, computer graphics and multimedia. This Study Program is instructed in Czech only.
Key learning outcomes
Student of the Follow-Up Master Study Program acquire deeper knowledge in a chosen branch of study and will give him knowledge and skills base to analyse, design and verification of problems solved in research and scientific as well as in the practice This guarantee that the alumni will be successful creative worker in the appropriate information technology branch.
Access to further studies
Alumni can continue their studies within the doctoral study program Computer Science and Engineering at FIT BUT or within related study programs at other universities.
Examination regulations, assessment and grading
diploma thesis, final state examination
Mode of study
ECTS departmental co-ordinator
Branches (course structure diagrams with ECTS credits)
|Year||Branch||Course structure diagram with credits|
|0||MBS||Information Technology Security||10||50||60|
|0||MMM||Mathematical Methods in Information Technology||44||16||60|
|1||MBI||Bioinformatics and biocomputing||38||22||60|
|1||MPV||Computer and Embedded Systems||30||30||60|
|1||MGM||Computer Graphics and Multimedia||50||10||60|
|1||MSK||Computer Networks and Communication||40||20||60|
|1||MBS||Information Technology Security||30||30||60|
|1||MMI||Management and Information Technologies||35||25||60|
|1||MMM||Mathematical Methods in Information Technology||10||20||30?|
|2||MBI||Bioinformatics and biocomputing||36||24||60|
|2||MPV||Computer and Embedded Systems||33||27||60|
|2||MGM||Computer Graphics and Multimedia||23||37||60|
|2||MSK||Computer Networks and Communication||33||27||60|
|2||MBS||Information Technology Security||33||27||60|
|2||MMI||Management and Information Technologies||38||22||60|
|2||MMM||Mathematical Methods in Information Technology||18||42||60|