The BSc in Business Informatics, Computer Engineering and Computer Programming offers the opportunity to study cryptography and IT security in several areas. The following subjects will provide you with an understanding of modern technologies and prepare you for the challenges of the IT industry, while developing skills to effectively solve real-life problems.
Fundamentals of IT Security
The necessity of data protection and its main objectives. Ensuring availability, integrity, and confidentiality. Physical, human, and technical threats and defenses against them. Data protection, digital signatures, and cybersecurity laws. The process of encryption, symmetric and asymmetric encryption, DES, 3DES, AES, RSA, digital signatures, hash functions. Public Key Infrastructure (PKI), certification authorities. Identification, authentication, authorization. User authentication. The SSL/TLS protocol.
IT security
Examination of file access systems, file permissions, management and configuration of encrypted file systems, user management, passwords and authentication methods, SSH authentication, key generation, network traffic analysis using the Wireshark software package, OpenSSL library.
Advanced Data Security
Basic concepts, attacks, symmetric encryption algorithms, block cipher modes, stream ciphers. Asymmetric algorithms: systems based on discrete logarithms, their practical implementations, attacks. Digital signatures: hash, MAC functions, remote user authentication. Federated identity, Single Sign-On (SSO), internet security protocols: TLS/SSL protocol, secure email: PGP and S/MIME. Wireless network security: mobile device security, Wi-Fi security, anonymous communication.
Blockchain technology
During the course, we will explore blockchain technology in depth, including its history and key properties. In the following weeks, we will examine the cryptographic background of blockchain, focusing on transactions, consensus mechanisms, and the various application areas of the technology, such as cryptocurrencies and smart contracts. This will be complemented by rich case studies and perspectives on the future of blockchain.
Ethical hacking
Linux user knowledge required for ethical hacking: BASH scripting, pipes. Basic concepts and associated tools: bind shell, reverse shell, SSH, netcat, socat, msfvenom. Vulnerability search: searchsploit, exploit-DB. Use of automatic and semi-automatic tools: Nessus, LinPEAS, WinPEAS. Hash and password attacks, both online and offline: hashcat, john the ripper, THC hydra, wpscan, Burp Suite. Network monitoring and penetration: Wireshark, aircrack-ng, dirbuster, gobuster.