Abbreviations **p-sz** - obligatory module of common theoretical basis, obligatory for all specialisations, **pv-ob** - elective branch module, obligatory for selected branches, **pv-za** - elective specialisation module, obligatory for selected specialisations, **p-hu** - obligatory humanity module, **p-em** - obligatory economical-management module, **p-pr** - obligatory project, **pv-hu** - elective humanity module, **v** - elective module.

module (abbreviation) | dimension | completion | type of module | lecturer | recom. year |

Statistics for Informatics ( MIE-SPI ) | 4+1 | z,zk | p-sz | Blažek, Ph.D. | 1. |

Parallel Algorithms and Systems ( MIE-PAR ) | 3+1 | z,zk | p-sz | prof. Tvrdík | 1. |

Systems Theory ( MIE-TES ) | 2+1 | z,zk | p-sz | prof. Moos | 1. |

Modern Internet Technologies ( MIE-MTI ) | 2+1 | z,zk | pv-ob | Navrátil, CSc. | 1. |

Web Services and Middleware ( MIE-MDW ) | 2+1 | z,zk | pv-ob | Vitvar, Ph.D. | 1. |

Cybernality ( MIE-KYB ) | 2+0 | zk | p-hu | doc. Jirovský | 1. |

Mathematics for Informatics ( MIE-MPI ) | 4+1 | z,zk | p-sz | doc. Šolcová | 1. |

Advanced Computer System Architectures ( MIE-POA ) | 2+1 | z,zk | pv-ob | prof. Tvrdík | 1. |

Parallel Computer Architectures ( MIE-PAP ) | 2+1 | z,zk | pv-ob | Šimeček, Ph.D. | 1. |

Wireless Computer Networks ( MIE-BPS ) | 2+1 | z,zk | pv-ob | doc. Janeček | 1. |

elective module | 2+1 | z,zk | v | 1. | |

elective module | 2+1 | z,zk | v | 1. | |

Project Management ( MIE-PRM ) | 1+2 | z | p-em | Vala | 1. |

Problems and Algorithms ( MIE-PAA ) | 3+1 | z,zk | pv-ob | Schmidt, Ph.D. | 2. |

Distributed Systems and Computing ( MIE-DSV ) | 2+1 | z,zk | pv-ob | doc. Janeček | 2. |

Network Security ( MIE-SIB ) | 2+1 | z,zk | pv-ob | Blažek, Ph.D. | 2. |

Master Project ( MIE-MPR ) | z | p-pr | 2. | ||

elective module | 2+1 | z,zk | v | 2. | |

elective module | 2+1 | z,zk | v | 2. | |

Information Security ( MI-IBE ) | 2+0 | zk | p-em | Čermák, CSc. | 2. |

elective module | 2+1 | z,zk | v | 2. | |

IT Support to Business and CIO Role ( MIE-CIO ) | 3+0 | zk | p-em | prof. Dohnal | 2. |

obligatory humanity module | zk | pv-hu | 2. | ||

Master Thesis (MIE-DIP) | z | p-pr | 2. |

- Wireless local communication, properties of radio communication channels.
- Communication channels, coding and modulation methods, CDMA, OFDM.
- Mechanisms of shared channels access in wireless networks, MAC.
- Addressing schemes in wireless networks, time synchronization, localization, mobility.
- Networks IEEE 802.11b/g/a/n, communication, relation to IP, security mechanisms.
- WiMax networks (IEEE 802.16), access mechanisms, mobility.
- Ad-hoc networks: construction of communication topology.
- Routing in ad-hoc networks, proactive and reactive methods.
- Sensor networks, architecture and communication principles.
- Technology of mobile phones GSM, architecture, localization, modern technologies UMTS, LTE.
- Bridges between wireless networks and TCP/IP and VoIP networks.
- Technologies of sensor networks, ZigBee.

- Introduction. IT trends and business support. CIO and CEO relationship. ICT Management (categorization, management models, services, processes).
- CIO role, responsibility. CIO Decision Cycle (business goals, innovation, strategy, plan, execution, measurement).
- The value chain and ICT support. Marketing and selling processes, business cycle.
- CIO priorities: Team management. Understanding of the business environment. ICT vision. Shape ICT demand and communicate expectations. IT Governance.
- CIO priorities: Bring business and ICT strategies together. Communication of the ICT value to business. Risk Management.
- CIO priorities: Creation of a new ICT. Change in the profile of ICT people. ICT competencies (technical, business, behavioral).
- ICT business cases on workforce (time management, meeting management, delegation).
- ICT business cases on workforce (appraisal, coaching, mentor, mentee).
- CRM as an example of ICT support of business processes. CRM and enterprise culture.
- CRM processes.
- CRM Technology. CRM innovation and the role of ICT.
- Specific tasks of ICT management (sourcing, cost cutting).
- Invited lecturer – CIO of a selected company, discussion.

- Distributed applications, synchronous and asynchronous model of computation.
- Program support for distributed computation, middleware techniques.
- Detection of the state of a distributed application, data consistency, logical time.
- Distributed mechanisms for exclusive access.
- Complexity of a distributed computation, client-server models, symmetry breaking.
- Deadlocks, their prevention and detection, mechanisms for deadlock avoidance.
- Termination of a distributed computation, termination detection algorithms.
- Failures of a distributed computation, recovery, consensus, quorum techniques.
- Data sharing and replication, security mechanisms in distributed databases.
- Load balancing mechanisms for distributed computations.
- P2P data systems, distributed hash tables (DHT).
- Systems of DHTs: CAN, Pastry, Kademlia.
- Mobility in distributed systems, mobile agents, active networks.

- Management, management and governance, IT management.
- Information security management system, IS/ICT governance, international standards on IS/ICT security, legislation in the Czech Republic.
- Risk management.
- Physical security, access control system, information resource valuation, internal and external threats, evaluation of countermeasures,
- Administration security (guidelines, training).
- Disaster recovery planning, business continuity management, incident management,
- IS/IT audits, application security testing, penetration testing, certifications.
- Certification according ISO 27001, Best practises (ISO 17999),
- Information security trends.

- Basic leslative norms relevant for operation of computer systems and networks, basic notions.
- Classification of attacks.
- Systems for computer network operation monitoring.
- Cybernetic attacks, psychologic and social aspects of a cybernetic attack, life cycle of exploiting the system weaknesses.
- Hackers - hacker comunity, types and motivations of the hacker behaviour.
- Cyberterorism, its demonstration and methods.
- Principles of infoware, the role of intelligent agents, strategic information warfare.
- Principles of attacks on the web, trends of attacks and attackers, phases of an attack, coordination and management of an attack.
- Basic types of attacks - DoS, forged node, manipulation with address sequences.

- Current and future roles of web services in ICT industry.
- Objects, components, services. SOA.
- Web Service Description Language (WSDL) and selected WS-* specifications.
- Representational State Transfer (REST) and its RESTful realization, comparison with WSDL.
- Process modelling workflow patterns, Business Process Execution Language (BPEL).
- Middleware architectures: ESB, P/S, MQ.
- Reliability and scalability of applications.
- P2P systems, Skype case study.
- Commercial software model vs. SaaS model.
- Cloud computing, architectures of modern applications.
- Infrastructure as a Service (IaaS), distributed processing and distributed file systems.
- Platform as a Service (PaaS), Google case study.
- Software as a Service (SaaS), SalesForce and GoodData case study.

- [2] Universal algebra: groups, finite groups, Cayley tables, group types, permutation, alternating, cyclic, and symmetry groups, normal subgroups.
- Finite fields, prime order of field, rings and their properties, integral domain, ideal. Lattices.
- Introduction to category theory, classes of objects, classes of morphisms and its properties, examples of categories: grupoid, category of all lattices, category of all commutative groups, category of all integral domains, category of all relations. Homomorphisms.
- Selected problems of graph theory, types of Hamiltonian problems. Algebraic solutions of combinatorial problems, Polya enumeration theorem.
- Algebra and algorithms (Algorithms for calculations of polynom roots - Newton' method, Lehmer-Schur's method, etc.).
- Convex sets, convex hull, pure convex set, theorem on partition of convex sets, Minkowski theorem on projection.
- Selected problems of number theory, quadratic congruence, Gauss algorithms. Special primes - factorial, palindromic, cyclic, Gauss', Eisenstein's primes. Examples of applications.
- Properties of Fermat primes, Little Fermat Theorem, primality tests, Pépin test, number theory and geometry, constructability of polygons.
- Selected numerical methods, Lagrange and Hermite interpolation, numerical integration, numerical solution of ordinary differential equations, calculating of eigenvalues of matrices, methods of solving of linear equations systems.
- Fast algorithms: multiplication, numerical searching of square roots, Fourier transformation, Fermat transformation.
- Axiomatic systems and their properties, recursive functions, proofs in the axiomatic system, examples of axiomatic systems, Peano's arithmetics, von Neumann's model of numbers.
- Special logics, multi-valued logics, modal logics, fuzzy logics.

- Drawbacks of the today's internet.
- Optical networks: Basic technology and communication media characteristics, protocols, modulation methods for achieving higher rates (40, 100 Gbps).
- Network virtualisation: MPLS, VLAN, tunnels, private networks, IPv4/IPv6 intersection.
- Network management I: Network traffic monitoring.
- Network management II: Security and access control, authorization, encryption.
- Throughput and performance measurement methods.
- Tools for traffic security analysis as a prevention against viruses spreading and other attacks.
- Traffic management, traffic taxonomies, traffic policy in large networks, congestion control, scheduling algorithms, bandwidth reservation methods
- VoIP and applications: H323, SIP, codecs, clients, software exchanges.
- Multimedia transfers: video, IPTV, multicast, the RTP and RSV protocols, HDTV tranfers, 4K.
- Experimental Networks and applications for Future Internet.
- Context-oriented networks, multilayer application networks, access federalization.
- Interconnects with low start-up latencies for grid applications and highly parallel systems. Solutions on the basis of TCP, Myrinet and Infiniband technologies.

- Discrete optimization, examples of practical tasks. Combinatorial problems. Algorithm complexity, problem complexity.
- State, state space, search space. Basic exact search methods.
- Decidable problems. models of computation. The classes P and NP. Polynomial hierarchy. The classes PO and NPO.
- The notion of completeness. Complexity comparison techniques. The classes NP-complete and NP-hard. The structure of NP and NPO.
- Deterministic approximation algorithms. Classification of approximative problems. Pseudopolynomial algorithms. Randomization and randomized algorithms.
- Practical deployment of heuristic and exact algorithms. Experimental evaluation.
- Simple local heuristics in state space and search space.
- Simulated annealing.
- Simulated evolution: taxonomy, genetic algorithms.
- Advanced genetic algorithms: competent GA, fast messy GA, the selfish gene method. Applications to multicriterial optimization.
- Stochastic optimization: models and applications. Bayesian optimization.
- Tabu search.
- Global methods, taxonomy of decomposition-based methods. Exact and heuristic global methods, the Davis-Putnam procedure seen as a global method.

- SIMD architectures. programming, data dependency solutions, hiding latency of instructions.
- VLIW architectures, programming, speculative solutions of data dependences, solutions for exceptions.
- VLIW architectures for digital signal processing.
- Multithreaded architectures.
- Homogeneous multi-core architectures, memory subsystem, interrupts.
- Heterogeneous multi-core architectures, shared and local memory, data transfers.
- GPU architectures.
- Programming environments and tools for multicore architectures.
- Programming environments and tools for GPUs.
- Systems on chip (SoC, NoC), switching networks, synchronous and asynchronous module interconnections.
- Special parallel architectures, neural networks.

- Performance characteristics of parallel computations.
- Models of parallel systems with shared memory.
- Interconnection networks of parallel computers.
- Embeddings and simulations of interconnection networks.
- Models for interprocessor communication and routing.
- Collective communication algorithms.
- Fundamental parallel algorithmics.
- Parallel sorting algorithms.
- Parallel algorithms for linear algebra.
- Parallel combinatorial space search.

- Trends in computer design. multiprocessing, multicore, multithreading.
- High availability clusters.
- Parallel processing clusters.
- Scheduling methods in the OS and load balancing.
- Computer virtualisation in HW.
- Computer virtualisation in SW.
- Desktop virtualisation.
- Datacenter "virtualisation".
- Memory levels: CPU cache, RAM, SSD, HDDs, tapes.
- Data storages: RAID, disk array architectures.
- Multi-tier architecture.
- The problem of availability in complex architectures.
- TCO, ROI, and new equipment acquisition.

- Project management, project, process. Definition of project participants, aims, metrics, quantification, planning, budget.
- Role of the project manager (presentation, levels of communication, duties). Life cycle and stages of a project.
- Project documents. Pre-business and business stages of a project.
- Preparation and realization stages of a project. Operation and closure of a project.
- Stabilization of a project, feedback, control mechanisms (methodical, contractual, or matter-of-fact supervision), risk management.
- Contractual arrangement of a project, business negotations, quality of delivery (SLA, security), warranty.
- Demand, definition of services, evaluation of proposals, the act of public contracts, evaluation criteria.
- Financial control.
- Project team management - human resources (roles, CIO, conducting a meeting, written records, tasks).
- Management of large projects (by area, by volume). Multiproject enviroment (reporting, coordination).
- Principles of methodology of poject management – Prince2, PMI. Quality management of project according to norms ISO 10006, ISO 9001.
- Setting up project management to company (linear x project management, process management).
- Particularities of project management of IS development.

- : Selected network protocols and their security aspects.
- Basic cryptography for protection of communication protocols.
- Technical and sociological methods of attacks on information networks and systems.
- Technologies and systems for detection and prevention of network intrusions.
- Monitoring of network traffic in high-speed networks.
- Basic probabilistic aspects of modeling large-scale high-speed networks.
- Realistic simulations of information networks.
- Statistical methods for detection of network intrusions.

- Basics of Probability Theory: Probability Space, Definitions, Properties, Sigma-continuity, etc.
- Basics of Probability Theory: Conditional Probability, Independence, Commented Examples
- Basics of Probability Theory: Random Variables, Cumulative Distribution Function, Probability Density Function, Dependence, Random Vectors, Marginal and Joint Distribution
- Basics of Probability Theory: Conditional Distribution, Conditional Expectation, Characteristics of Random Variables, Selected Examples of Probability Distributions
- Basics of Probability Theory: Poisson Process, Simulation Methods, Generating Functions
- Basics of Probability Theory: Strong Law of Large Numbers (SLLN), Central Limit Theorem (CLT), Large Deviations, Entropy
- Discrete-time Markov Chains with Finite State Space: Basic Concepts, Irreducibility and Periodicity of States, Absorption Probability, Stopping Times
- Discrete-time Markov Chains: Examples: Generalized Random Walk, Random Walk on a Graph, Gambler's Ruin, Coupon Collector
- Discrete-time Markov Chains: Asymptotic Stationarity, Uniqueness and Existence of Stationary Distributions, Convergence
- Discrete-time Markov Chains: Branching Processes, Birth & Death processes
- Monte Carlo Methods: Markov Chain Monte Carlo (MCMC) – Basic Concepts and Examples
- Monte Carlo Methods: Fast convergence of MCMC, Propp-Wilson Algorithm, Sandwiching, Simulated Annealing
- Monte Carlo Methods: Monte Carlo Estimates, Monte Carlo Tests, Reduction of Variance
- Stochastic Processes: Definition, Distribution Function, Characteristics of Stochastic Processes
- Stochastic Processes: Characteristics and Classification of Stochastic Processes, Examples
- Basics of Queueing Theory: Elements of Queueing Systems, Request Arrival Process, Queueing Policy, Service Policy, Kendall Notation
- Stochastic Processes: Application of the Poisson Process to Model Arrivals in Queueing Systems
- Stochastic Processes: Application of the Poisson Process in Queueing Theory
- Stochastic Processes: Non-homogeneous Poisson Process, Spatial Poisson Process, M/G/infinity Queue
- Continuous-time Markov Chains: Jump Rates, Timing Jumps by Poisson Process Arrivals, Kolmogorov Equations
- Basics of Queueing Theory: M/M/m Queues, Queueing Systems
- Basics of Queueing Theory: Open and Closed Queueing Systems
- Bootstrap Methods: Properties of Bootstrap Approximations, Bootstrap Correction of Estimation Bias
- Bootstrap Methods: Bootstrap Confidence Intervals, Permutation Bootstrap
- Bootstrap Methods: Bootstrap Confidence Intervals for Parameters in Linear Regression
- Estimation of Probability Density Functions: Histogram, Kernel Estimates, Maximum Likelihood Estimation, Estimation by the Method of Moments

- System definition. Structural and functional concept of a system.
- Compositional and dynamic systems. Hard and soft systems.
- Identification of a system.
- Structural tasks of the system analysis. Paths and feedbacks.
- Tasks of decomposition and composition of a system and tasks of system goals.
- System behavior, behavior models, the notion of a process.
- Formalisms for the analysis of model behavior: Petri nets, decision tables.
- Bulk analysis and other methods of system analysis.
- Soft systems, methods of their analysis.
- Selected methodologies of system design, the SSADM method.
- System synthesis with discrete time.
- Decision and decision processes.
- Information in a system and in its neighborhood, system regularity, system viability.

Last modified: 11.6.2012, 11:18