In the 2022/2023 school year, the Department of Information Technologies is once again organizing a separate cycle of professional lectures on current topics in the field of Information and Communication Technologies. Of the expected nine lectures offered, four will be in English (for students of English majors and other interested parties). The cycle of lectures will take place in LS (period February to April).
The aim is primarily to enrich and supplement standard teaching, support the competitiveness of graduates on market work and further deepening of departmental cooperation with practice.
In addition to the lecture's own thematic content, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc.
The chosen target group in LS are students of the field of Informatics in the 2nd year of bachelor's and 1st year of subsequent master's studies. The lectures concern the subjects Operating systems and computer networks, Operating systems and computer networks, IS security, and Computer security.
Students are required to graduate at least one a professional lecture (or two, if specified in the subject) of your own choice from the given cycle (credit condition). Of course, a student can also register for more lectures. Login takes place through the forms on the wp website (see below). The cycle of lectures runs from February 22, 2023 as standard on Wednesdays from 15:45 in the EIV classroom, on some dates in the EIII. The cycle runs until the end of April 2023.
Registration of students for lectures is ongoing from February 13, 2023 through the department's website.
Attendance will be recorded at the lectures!
Read carefully the Information on the system of attendance at the Cycle of lectures by ICT experts
ATTENTION! The completed lecture can be counted as part of the credit within the compulsory bachelor's practice!
Date | Topic of the lecture | Lecturer | Company, position | Room | Language | |
22. 2. 2023 | SIEM, SOAR systems and BAS | Ondrej Kovač | .. | EIV | English | . |
What are the security challenges of a virtualized environment? How can security risks be detected? What are the duties and activities of the people working in the SOC. You will learn all this and even more at the lecture. |
01. 3. 2023 | Network security |
Radek Cerny | Extreme Networks |
EIII | English | . |
The lecture will focus on the area of networks and system administration with a focus on wireless and network security. More will be specified after February 20, 2023. |
08. 3. 2023 | SAP HANA Cloud and Analytics | I recommend Benek | SAP Labs Brno |
EIV | English | . |
Getting the right information at the speed of an F1 car is necessary today. In our in-memory column-based databases SAP HANA Cloud, it's a given. With further data integration into the SAP Data Warehouse Cloud on top of it, you can unleash a data-driven business. Finally, SAP Analytics Cloud allows users to plan, discover, predict, and collaborate in one place. With all of this, SAP is helping the world work better, even where you wouldn't expect it. Like at an esports leader competing in Dota 2. |
15. 3. 2023 | Software Security | Ludek Bednarcz | SAP Labs Brno |
EIV | English | . |
How is the software security being handled in a big software house like SAP? What are the threats and how do we mitigate them? Is the security one-time topic or never-ending story? We will also touch on security awareness and secure programming and security testing topics. |
22. 3. 2023 | High Performance Computer |
Jaroslav Cervinka | SKODA CAR | EIII | no | . |
We classify calculations and rendering (generation of photorealistic images and presentations) in HPC as virtual methods, i.e. obtaining results without building a prototype and its subsequent (non-)destructive measurement/scanning, which is expensive and time-consuming. With the current high variability of model series and markets, it is advantageous to use virtual methods for quick parameter verification/photorealistic display of a specific model. Also, when deciding between several variants (e.g. in design), the result of the virtual method is essential. A current example is CO2 emissions, where there is an air resistance effect expressed by the drag coefficient, which is the result of the calculation of external aerodynamics. Adequate security is based on a quality foundation, i.e. a reliable infrastructure. Advanced ones should not be missing here monitoring tools, both of building elements and network communication. At the lecture, you will learn how production networks looked before and how they look today. We will tell you real incidents in production and how to prevent these risks. |
05. 4. 2023 | IT security in production | Erich Tangled | SKODA CAR | EIV | no | . |
In the period of rapid development of digitalization, cyber security is essential in the environment of industrial companies. Where there is IT, there is a need to address IT security.
Adequate security is based on a quality foundation, i.e. a reliable infrastructure. Advanced ones should not be missing here monitoring tools, both of building elements and network communication. At the lecture, you will learn how production networks looked before and how they look today. We will tell you real incidents in production and how to prevent these risks. |
12. 4. 2023 | IQRF wireless technology |
.. | QRF Alliance, sro | EIV | no | . |
The lecture will focus on IQRF technologies, which is a wireless technology for data transmission in mesh networks with extremely low consumption and high reliability. The transmission is two-way and fast enough for both data collection and control of electronic devices. Network transmission is protected by security standards at several levels. Over the past two years, technology has seen another significant advance in device interoperability. Newly emerging devices that are certified for interoperability are automatically recognized in the network, and management takes place according to standardized commands defined in the IQRF Repository. The presentation includes a demonstration of a functional IQRF network connected to an IQRF Gateway, including visualization of values. |