{"id":13581,"date":"2025-10-01T10:41:50","date_gmt":"2025-10-01T08:41:50","guid":{"rendered":"https:\/\/kit.pef.czu.cz\/?p=13581"},"modified":"2025-12-03T10:54:36","modified_gmt":"2025-12-03T09:54:36","slug":"cyklus-prednasek-odborniku-z-praxe-zs-2025-2026","status":"publish","type":"post","link":"https:\/\/kit.pef.czu.cz\/en\/zpravy-akce-prednasky\/cyklus-prednasek-odborniku-z-praxe-zs-2025-2026\/","title":{"rendered":"LECTURE CYCLE BY EXPERTS FROM PRACTICE WS 2025\/2026"},"content":{"rendered":"<p><strong>The Department of Information Technology is once again organizing a separate series of professional lectures on current topics in the field of Information and Communication Technologies in the winter semester 2025\/2026. The lectures offered will be gradually available from the recording during the academic year. The lecture series takes place in the winter semester (October to December).<\/strong><\/p>\n\n\n\n<p>The main goal is to enrich and supplement the standard teaching, support the competitiveness of graduates on the labor market and further deepen the department&#039;s cooperation with practice.<\/p>\n\n\n\n<p>In addition to the lecture&#039;s own thematic content, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc.<\/p>\n\n\n\n<p>The selected target group in the ZS is students of the field of Informatics in the 3rd year of Bachelor&#039;s degree, 1st year of follow-up Master&#039;s degree. , as well as students of the field of Business and Administration in the 1st and 2nd years of follow-up Master&#039;s degree. The lectures concern the subjects Web design and Computer Networks.<\/p>\n\n\n\n<p>Students are required to graduate&nbsp;<strong>at least&nbsp;<\/strong>one professional lecture (or two, if specified in the subject) of your own choice from the given cycle (credit condition). Of course, a student can also register for more lectures. Registration takes place via the forms on the KIT website (see below). The cycle of lectures runs from<strong>&nbsp;20. 10. 2025<\/strong>&nbsp;<strong>on Mondays from 15:45 in the EIV classroom<\/strong>, in some terms <strong>on Thursday at EIV or EII<\/strong>. The cycle runs until&nbsp;<strong>December 8, 2025<\/strong>. <\/p>\n\n\n\n<p>Registration of students for lectures will take place from<strong>&nbsp;02. 10. 2025<\/strong>&nbsp;through the department&#039;s website.<\/p>\n\n\n\n<p>Attendance will be recorded at the lectures!<\/p>\n\n\n\n<p><strong><a title=\"\" href=\"https:\/\/kit.pef.czu.cz\/en\/informace-k-systemu-dochazky-na-cyklus-prednasek-odborniku-z-praxe-ict\/\">Read carefully the Information on the system of attendance at the Cycle of lectures by ICT experts<\/a><\/strong><\/p>\n\n\n\n<p><strong>ATTENTION! A lecture completed outside of lectures included directly in the teaching is counted as part of the credit within the mandatory bachelor&#039;s practice!<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><thead><tr><td class=\"has-text-align-left\" data-align=\"left\">\n<p><strong>Date<\/strong><\/p>\n<\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<p><strong>Topic of the lecture<\/strong><\/p>\n<\/td><td class=\"has-text-align-left\" data-align=\"left\"> <strong>Lecturer<\/strong> <\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<p><strong>Company, position<\/strong><\/p>\n<\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<p><strong>Room<\/strong><\/p>\n<\/td><th class=\"has-text-align-left\" data-align=\"left\"><strong>Language<\/strong><\/th><th><\/th><\/tr><tr><th class=\"has-text-align-left\" data-align=\"left\">20. 10. 2025 at 15:45<\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Security technologies and their possible uses<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong>Jan Vaclavik<\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong> Fortinet<\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\">EIV<\/th><th class=\"has-text-align-left\" data-align=\"left\">..<\/th><th>IT HAPPENED<\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<p>Primarily intended for students INFO \u2013 Computer Networks<\/p>\n\n\n\n<p>The lecture will focus on current trends in cybersecurity and practical possibilities for using modern technologies to protect information systems. Fortinet will present an integrated approach to security architecture, including network, application and cloud protection, threat prevention and identity and access management. Participants will gain an overview of tools for detecting and responding to attacks, automating security processes and ensuring compliance with regulations. The lecture will also offer examples of deployment in practice and show how security technologies support stable operations and digital transformation of organizations.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#59103f\" class=\"has-inline-color\">3. 11. 2025<\/mark> at 3:45 p.m.<\/th><th class=\"has-text-align-left\" data-align=\"left\">Wireless IoT networks<\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#59103f\" class=\"has-inline-color\">Jan Vesely<\/mark><\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\">JoTio Tech<\/th><th class=\"has-text-align-left\" data-align=\"left\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#59103f\" class=\"has-inline-color\">EI<\/mark>IN<\/th><th class=\"has-text-align-left\" data-align=\"left\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#59103f\" class=\"has-inline-color\">..<\/mark><\/th><th>IT HAPPENED<\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<p>Primarily intended for students INFO \u2013 Computer Networks<\/p>\n\n\n\n<p><em>The Internet of Things (IoT) is one of the new dynamic directions in which the IT world is moving. Therefore, in this lecture we will introduce the main representatives of the IoT wireless networks that are around us, including those that we can, so to speak, touch at our University. We will list the differences between the individual technologies and the main directions of their use. IoT will not be just a theoretical &#039;-I- -O-nly -T-alk&#039;, but we will show examples where it really helps and makes our lives easier \ud83d\ude42<\/em><\/p>\n\n\n\n<figure style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">13. 11. 2025 at 8:45<\/th><th class=\"has-text-align-left\" data-align=\"left\">We are not afraid of IPv6<\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong><strong><strong>Ladislav Ruzicka<\/strong><\/strong><\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>GRAPE SC, as<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\">EIV<\/th><th class=\"has-text-align-left\" data-align=\"left\">..<\/th><th>IT HAPPENED<\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<p>For INFO students \u2013 Computer Networks subject<\/p>\n\n\n\n<p>In the lecture, you will learn why we should deploy\/require IPv6 addresses and what the excuses and reality from the ISP world &quot;why it can&#039;t be done&quot; are.<\/p>\n\n\n\n<figure style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">26. 11. 2025 at 8:45<\/th><th class=\"has-text-align-left\" data-align=\"left\">UX in \u010cSAS<\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong><strong>Anton\u00edn Sr\u00e1mek and Eli\u0161ka Ungerov\u00e1<\/strong><\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Czech Savings Bank, Inc.<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\">EII<\/th><th class=\"has-text-align-left\" data-align=\"left\">..<\/th><th>IT HAPPENED<\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<p>For INFO students \u2013 Webdesign course<\/p>\n\n\n\n<p>The lecture will introduce \u010cesk\u00e1 spo\u0159itelna&#039;s approach to user experience (UX) and its role in the design of digital products and services. You will see how UX design is applied in the development of mobile and online banking, how user testing is carried out and how feedback is collected and evaluated. The principles of simplicity, trust and accessibility will be emphasized, which lead to higher client satisfaction and effective fulfillment of their needs. Participants will gain inspiration on how UX methodologies can be used in other areas of digital transformation.<\/p>\n\n\n\n<figure style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">27. 11. 2025 at 8:45<\/th><th class=\"has-text-align-left\" data-align=\"left\">Modern trends in securing network access<\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong><strong><strong>Tomas the Emperor<\/strong><\/strong><\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>ALEFnil<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\">EIV<\/th><th class=\"has-text-align-left\" data-align=\"left\">..<\/th><th>IT HAPPENED<\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<p>For students of INFO \u2013 Computer Networks<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p>The lecture will focus on current approaches to managing and protecting access to corporate networks in the era of growing cyber threats and a hybrid environment. Modern technologies and concepts such as the principle of zero trust, identity-based network access, multi-factor authentication, and dynamic authorization management will be introduced. Participants will gain an overview of how to effectively protect corporate data and services while ensuring secure and comfortable user access from anywhere. Practical examples will show how these trends can be implemented in real environments and thus support the digital transformation of organizations.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Department of Information Technology is once again organizing a separate series of professional lectures on current topics in the field of Information and Communication Technologies in the 2025\/2026 academic year. The lectures offered will be gradually available from the recording during the academic year. The lecture series takes place in the winter semester (October to December). The aim is primarily to enrich and supplement standard teaching, support the competitiveness of graduates in the labor market and further deepen the department&#039;s cooperation with practice. In addition to the actual thematic content of the lecture, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc. The selected target group in the winter semester is 3rd-year students of the field of Informatics<\/p>","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[46,112,113,119,79,48],"tags":[],"class_list":["post-13581","post","type-post","status-publish","format-standard","hentry","category-akce","category-aktualni","category-budouci","category-prednasky-odborniku","category-homepage","category-prednasky"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Eva K\u00e1nsk\u00e1","author_link":"https:\/\/kit.pef.czu.cz\/en\/zpravy-akce-prednasky\/author\/kanska\/"},"uagb_comment_info":0,"uagb_excerpt":"Katedra informa\u010dn\u00edch technologi\u00ed op\u011bt po\u0159\u00e1d\u00e1 v ZS 2025\/2026 samostatn\u00fd cyklus odborn\u00fdch p\u0159edn\u00e1\u0161ek na aktu\u00e1ln\u00ed t\u00e9mata z oblasti Informa\u010dn\u00edch a komunika\u010dn\u00edch technologi\u00ed. Nab\u00edzen\u00e9 p\u0159edn\u00e1\u0161ky budou postupn\u011b v pr\u016fb\u011bhu akademick\u00e9ho roku k dispozici ze z\u00e1znamu. Cyklus p\u0159edn\u00e1\u0161ek prob\u00edh\u00e1 v ZS (obdob\u00ed \u0159\u00edjen a\u017e prosinec). C\u00edlem je p\u0159edev\u0161\u00edm obohacen\u00ed a dopln\u011bn\u00ed standardn\u00ed v\u00fduky, podpora konkurenceschopnosti absolvent\u016f na trhu&hellip;","_links":{"self":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/comments?post=13581"}],"version-history":[{"count":12,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13581\/revisions"}],"predecessor-version":[{"id":13859,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13581\/revisions\/13859"}],"wp:attachment":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/media?parent=13581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/categories?post=13581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/tags?post=13581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}