Abbreviations

**p-sz** - obligatory module of common theoretical basis, obligatory for all specialisations,

**pv-ob** - elective branch module, obligatory for selected branches,

**pv-za** - elective specialisation module, obligatory for selected specialisations,

**p-hu** - obligatory humanity module,

**p-em** - obligatory economical-management module,

**p-pr** - obligatory project,

**pv-hu** - elective humanity module,

**v** - elective module.

module (abbreviation) | dimension | completion | type of module | lecturer | recom. year |

Statistics for Informatics ( MIE-SPI ) | 4+1 | z,zk | p-sz | Blažek, Ph.D. | 1. |

Parallel Computer Architectures ( MIE-PAR ) | 3+1 | z,zk | p-sz | prof. Tvrdík | 1. |

Systems Theory ( MIE-TES ) | 2+1 | z,zk | p-sz | prof. Moos | 1. |

Modern Internet Technologies ( MIE-MTI ) | 2+1 | z,zk | pv-ob | Navrátil, CSc. | 1. |

Advanced Cryptology ( MIE-KRY ) | 2+1 | z,zk | pv-ob | doc. Lórencz | 1. |

Cybernality ( MIE-KYB ) | 2+0 | zk | p-hu | doc. Jirovský | 1. |

Mathematics for Informatics ( MIE-MPI ) | 4+1 | z,zk | p-sz | doc. Šolcová | 1. |

Arithmetics and Codes ( MIE-AAK ) | 2+1 | z,zk | pv-ob | doc. Pluháček | 1. |

Code Generators ( MIE-GEN ) | 2+1 | z,zk | pv-ob | Janoušek, Ph.D. | 1. |

Security and Hardware ( MIE-BHW ) | 2+1 | z,zk | pv-ob | Dr.-Ing. Novotný | 1. |

elective module | 2+1 | z,zk | v | 1. | |

elective module | 2+1 | z,zk | v | 1. | |

Project Management ( MIE-PRM ) | 1+2 | z | p-em | Vala | 1. |

Problems and Algorithms ( MIE-PAA ) | 3+1 | z,zk | pv-ob | Schmidt, Ph.D. | 2. |

Security and Secure Programming ( MIE-BPR ) | 2+1 | z,zk | pv-ob | doc. Lórencz | 2. |

Network Security ( MIE-SIB ) | 2+1 | z,zk | pv-ob | Blažek, Ph.D. | 2. |

Master Project( MIE-MPR ) | z | p-pr | 2. | ||

elective module | 2+1 | z,zk | v | 2. | |

elective module | 2+1 | z,zk | v | 2. | |

Information Security ( MIE-IBE ) | 2+0 | zk | p-em | Čermák, CSc. | 2. |

elective module | 2+1 | z,zk | v | 2. | |

IT Support to Business and CIO Role ( MIE-CIO ) | 3+0 | zk | p-em | prof. Dohnal | 2. |

obligatory humanity module | zk | pv-hu | 2. | ||

Master Thesis (MIE-DIP) | z | p-pr | 2. |

- Standard number systems and negative number representations.
- Nonstandard number systems.
- Addition, subtraction, and carry acceleration.
- Multiplication.
- Division.
- Floating point.
- Evaluating elementary functions.
- Linear codes.
- Cyclic codes.
- The RM a BCH codes.
- Burst error correction.
- Convolution codes and turbo codes.
- Error coding for arithmetic.

- Security HW modules - cryptographic accelerators, random number generators, DRM support.
- HW support for authentication and identification - smart cards, tokens, RFID.
- HW means for physical parameter measurement - biometrics.
- Side-channels - technology and architecture influence, fault security.
- System tamper resistance - physical parameter monitors, trusted platforms, secure interconnection.
- Input and ouput security, storage security.

- Introduction to secure programming, current security trends.
- Threat modeling.
- Security at the memory hierarchy level.
- Writing secure code in C.
- Security levels, Access Control Lists (ACL).
- Running a program with low privileges.
- Data security and integrity.
- Data input, canonical representation, and security.
- Security of databases.
- Web, internationalization, and security.
- Security of sockets and RPC.
- Defence against Denial of Service attacks.
- Recap of rules for writing secure code.

- Introduction. IT trends and business support. CIO and CEO relationship. ICT Management (categorization, management models, services, processes).
- CIO role, responsibility. CIO Decision Cycle (business goals, innovation, strategy, plan, execution, measurement).
- The value chain and ICT support. Marketing and selling processes, business cycle.
- CIO priorities: Team management. Understanding of the business environment. ICT vision. Shape ICT demand and communicate expectations. IT Governance.
- CIO priorities: Bring business and ICT strategies together. Communication of the ICT value to business. Risk Management.
- CIO priorities: Creation of a new ICT. Change in the profile of ICT people. ICT competencies (technical, business, behavioral).
- ICT business cases on workforce (time management, meeting management, delegation).
- ICT business cases on workforce (appraisal, coaching, mentor, mentee).
- CRM as an example of ICT support of business processes. CRM and enterprise culture.
- CRM processes.
- CRM Technology. CRM innovation and the role of ICT.
- Specific tasks of ICT management (sourcing, cost cutting).
- Invited lecturer – CIO of a selected company, discussion.

- Overview of constructs of programming languages.
- Basic notions: types, variables, type compatibility and dynamic data structures.
- Basic notions: activation record, calling conventions.
- Internal forms.
- Direct code generation, AST $\to$ DAG $\to$ BB.
- DAG analysis, BB, dependencies and antidependencies.
- Register allocation, memory allocation (static, on the stack).
- Intermediate code optimization.
- Code generator, instruction selection.
- Translation of a stack-based language into the native HW, HW dependent optimizations.
- Modules and separate compilation.
- Support for debugging.
- Code generators for object-oriented programming languages.

- Management, management and governance, IT management.
- Information security management system, IS/ICT governance, international standards on IS/ICT security, legislation in the Czech Republic.
- Risk management.
- Physical security, access control system, information resource valuation, internal and external threats, evaluation of countermeasures,
- Administration security (guidelines, training).
- Disaster recovery planning, business continuity management, incident management,
- IS/IT audits, application security testing, penetration testing, certifications.
- Certification according ISO 27001, Best practises (ISO 17999),
- Information security trends.

- Mathematical fundamentals of cryptanalysis of cyphers.
- Random number generators.
- Symmetric cryptography (block and stream encryption).
- Asymmetric cryptography.
- Unidirectional functions, hash functions.
- Implementation of individual protocols.
- Linear cryptanalysis.
- Differential cryptanalysis.
- Algebraic cryptanalysis.
- Eliptic curves and their properties.
- [2] Algorithms and cryptosystems based on elliptic curves.
- Quantum computing and cryptography.

- Basic leslative norms relevant for operation of computer systems and networks, basic notions.
- Classification of attacks.
- Systems for computer network operation monitoring.
- Cybernetic attacks, psychologic and social aspects of a cybernetic attack, life cycle of exploiting the system weaknesses.
- Hackers - hacker comunity, types and motivations of the hacker behaviour.
- Cyberterorism, its demonstration and methods.
- Principles of infoware, the role of intelligent agents, strategic information warfare.
- Principles of attacks on the web, trends of attacks and attackers, phases of an attack, coordination and management of an attack.
- Basic types of attacks - DoS, forged node, manipulation with address sequences.

- [2] Universal algebra: groups, finite groups, Cayley tables, group types, permutation, alternating, cyclic, and symmetry groups, normal subgroups.
- Finite fields, prime order of field, rings and their properties, integral domain, ideal. Lattices.
- Introduction to category theory, classes of objects, classes of morphisms and its properties, examples of categories: grupoid, category of all lattices, category of all commutative groups, category of all integral domains, category of all relations. Homomorphisms.
- Selected problems of graph theory, types of Hamiltonian problems. Algebraic solutions of combinatorial problems, Polya enumeration theorem.
- Algebra and algorithms (Algorithms for calculations of polynom roots - Newton' method, Lehmer-Schur's method, etc.).
- Convex sets, convex hull, pure convex set, theorem on partition of convex sets, Minkowski theorem on projection.
- Selected problems of number theory, quadratic congruence, Gauss algorithms. Special primes - factorial, palindromic, cyclic, Gauss', Eisenstein's primes. Examples of applications.
- Properties of Fermat primes, Little Fermat Theorem, primality tests, Pépin test, number theory and geometry, constructability of polygons.
- Selected numerical methods, Lagrange and Hermite interpolation, numerical integration, numerical solution of ordinary differential equations, calculating of eigenvalues of matrices, methods of solving of linear equations systems.
- Fast algorithms: multiplication, numerical searching of square roots, Fourier transformation, Fermat transformation.
- Axiomatic systems and their properties, recursive functions, proofs in the axiomatic system, examples of axiomatic systems, Peano's arithmetics, von Neumann's model of numbers.
- Special logics, multi-valued logics, modal logics, fuzzy logics.

- Drawbacks of the today's internet.
- Optical networks: Basic technology and communication media characteristics, protocols, modulation methods for achieving higher rates (40, 100 Gbps).
- Network virtualisation: MPLS, VLAN, tunnels, private networks, IPv4/IPv6 intersection.
- Network management I: Network traffic monitoring.
- Network management II: Security and access control, authorization, encryption.
- Throughput and performance measurement methods.
- Tools for traffic security analysis as a prevention against viruses spreading and other attacks.
- Traffic management, traffic taxonomies, traffic policy in large networks, congestion control, scheduling algorithms, bandwidth reservation methods
- VoIP and applications: H323, SIP, codecs, clients, software exchanges.
- Multimedia transfers: video, IPTV, multicast, the RTP and RSV protocols, HDTV tranfers, 4K.
- Experimental Networks and applications for Future Internet.
- Context-oriented networks, multilayer application networks, access federalization.
- Interconnects with low start-up latencies for grid applications and highly parallel systems. Solutions on the basis of TCP, Myrinet and Infiniband technologies.

- Discrete optimization, examples of practical tasks. Combinatorial problems. Algorithm complexity, problem complexity.
- State, state space, search space. Basic exact search methods.
- Decidable problems. models of computation. The classes P and NP. Polynomial hierarchy. The classes PO and NPO.
- The notion of completeness. Complexity comparison techniques. The classes NP-complete and NP-hard. The structure of NP and NPO.
- Deterministic approximation algorithms. Classification of approximative problems. Pseudopolynomial algorithms. Randomization and randomized algorithms.
- Practical deployment of heuristic and exact algorithms. Experimental evaluation.
- Simple local heuristics in state space and search space.
- Simulated annealing.
- Simulated evolution: taxonomy, genetic algorithms.
- Advanced genetic algorithms: competent GA, fast messy GA, the selfish gene method. Applications to multicriterial optimization.
- Stochastic optimization: models and applications. Bayesian optimization.
- Tabu search.
- Global methods, taxonomy of decomposition-based methods. Exact and heuristic global methods, the Davis-Putnam procedure seen as a global method.

- Performance characteristics of parallel computations.
- Models of parallel systems with shared memory.
- Interconnection networks of parallel computers.
- Embeddings and simulations of interconnection networks.
- Models for interprocessor communication and routing.
- Collective communication algorithms.
- Fundamental parallel algorithmics.
- Parallel sorting algorithms.
- Parallel algorithms for linear algebra.
- Parallel combinatorial space search.

- Project management, project, process. Definition of project participants, aims, metrics, quantification, planning, budget.
- Role of the project manager (presentation, levels of communication, duties). Life cycle and stages of a project.
- Project documents. Pre-business and business stages of a project.
- Preparation and realization stages of a project. Operation and closure of a project.
- Stabilization of a project, feedback, control mechanisms (methodical, contractual, or matter-of-fact supervision), risk management.
- Contractual arrangement of a project, business negotations, quality of delivery (SLA, security), warranty.
- Demand, definition of services, evaluation of proposals, the act of public contracts, evaluation criteria.
- Financial control.
- Project team management - human resources (roles, CIO, conducting a meeting, written records, tasks).
- Management of large projects (by area, by volume). Multiproject enviroment (reporting, coordination).
- Principles of methodology of poject management – Prince2, PMI. Quality management of project according to norms ISO 10006, ISO 9001.
- Setting up project management to company (linear x project management, process management).
- Particularities of project management of IS development.

- : Selected network protocols and their security aspects.
- Basic cryptography for protection of communication protocols.
- Technical and sociological methods of attacks on information networks and systems.
- Technologies and systems for detection and prevention of network intrusions.
- Monitoring of network traffic in high-speed networks.
- Basic probabilistic aspects of modeling large-scale high-speed networks.
- Realistic simulations of information networks.
- Statistical methods for detection of network intrusions.

- Basics of Probability Theory: Probability Space, Definitions, Properties, Sigma-continuity, etc.
- Basics of Probability Theory: Conditional Probability, Independence, Commented Examples
- Basics of Probability Theory: Random Variables, Cumulative Distribution Function, Probability Density Function, Dependence, Random Vectors, Marginal and Joint Distribution
- Basics of Probability Theory: Conditional Distribution, Conditional Expectation, Characteristics of Random Variables, Selected Examples of Probability Distributions
- Basics of Probability Theory: Poisson Process, Simulation Methods, Generating Functions
- Basics of Probability Theory: Strong Law of Large Numbers (SLLN), Central Limit Theorem (CLT), Large Deviations, Entropy
- Discrete-time Markov Chains with Finite State Space: Basic Concepts, Irreducibility and Periodicity of States, Absorption Probability, Stopping Times
- Discrete-time Markov Chains: Examples: Generalized Random Walk, Random Walk on a Graph, Gambler's Ruin, Coupon Collector
- Discrete-time Markov Chains: Asymptotic Stationarity, Uniqueness and Existence of Stationary Distributions, Convergence
- Discrete-time Markov Chains: Branching Processes, Birth & Death processes
- Monte Carlo Methods: Markov Chain Monte Carlo (MCMC) – Basic Concepts and Examples
- Monte Carlo Methods: Fast convergence of MCMC, Propp-Wilson Algorithm, Sandwiching, Simulated Annealing
- Monte Carlo Methods: Monte Carlo Estimates, Monte Carlo Tests, Reduction of Variance
- Stochastic Processes: Definition, Distribution Function, Characteristics of Stochastic Processes
- Stochastic Processes: Characteristics and Classification of Stochastic Processes, Examples
- Basics of Queueing Theory: Elements of Queueing Systems, Request Arrival Process, Queueing Policy, Service Policy, Kendall Notation
- Stochastic Processes: Application of the Poisson Process to Model Arrivals in Queueing Systems
- Stochastic Processes: Application of the Poisson Process in Queueing Theory
- Stochastic Processes: Non-homogeneous Poisson Process, Spatial Poisson Process, M/G/infinity Queue
- Continuous-time Markov Chains: Jump Rates, Timing Jumps by Poisson Process Arrivals, Kolmogorov Equations
- Basics of Queueing Theory: M/M/m Queues, Queueing Systems
- Basics of Queueing Theory: Open and Closed Queueing Systems
- Bootstrap Methods: Properties of Bootstrap Approximations, Bootstrap Correction of Estimation Bias
- Bootstrap Methods: Bootstrap Confidence Intervals, Permutation Bootstrap
- Bootstrap Methods: Bootstrap Confidence Intervals for Parameters in Linear Regression
- Estimation of Probability Density Functions: Histogram, Kernel Estimates, Maximum Likelihood Estimation, Estimation by the Method of Moments

- System definition. Structural and functional concept of a system.
- Compositional and dynamic systems. Hard and soft systems.
- Identification of a system.
- Structural tasks of the system analysis. Paths and feedbacks.
- Tasks of decomposition and composition of a system and tasks of system goals.
- System behavior, behavior models, the notion of a process.
- Formalisms for the analysis of model behavior: Petri nets, decision tables.
- Bulk analysis and other methods of system analysis.
- Soft systems, methods of their analysis.
- Selected methodologies of system design, the SSADM method.
- System synthesis with discrete time.
- Decision and decision processes.
- Information in a system and in its neighborhood, system regularity, system viability.

Last modified: 1.10.2010, 16:06