{"id":13845,"date":"2026-02-11T20:07:22","date_gmt":"2026-02-11T19:07:22","guid":{"rendered":"https:\/\/kit.pef.czu.cz\/?p=13845"},"modified":"2026-04-13T09:57:35","modified_gmt":"2026-04-13T07:57:35","slug":"cyklus-prednasek-odborniku-z-praxe-ls-2025-2026","status":"publish","type":"post","link":"https:\/\/kit.pef.czu.cz\/en\/zpravy-akce-prednasky\/cyklus-prednasek-odborniku-z-praxe-ls-2025-2026\/","title":{"rendered":"LECTURE CYCLE BY PRACTICAL EXPERTS SS 2025\/2026"},"content":{"rendered":"<p><\/p>\n\n\n\n<p><strong>The Department of Information Technology is again organizing a separate series of professional lectures on current topics in the field of Information and Communication Technologies in the 2025\/2026 academic year. The lectures offered will be gradually available from the recording during the academic year. Out of a total of 5 lectures offered, one is in English. The lecture series takes place in the 2025\/2026 academic year (March to April).<\/strong><\/p>\n\n\n\n<p>The main goal is to enrich and supplement the standard teaching, support the competitiveness of graduates on the labor market and further deepen the department&#039;s cooperation with practice.<\/p>\n\n\n\n<p>In addition to the lecture&#039;s own thematic content, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc.<\/p>\n\n\n\n<p>The selected target group is LS students of the field of Informatics in the 2nd year of Bachelor&#039;s degree and 1st year of Master&#039;s degree. The lectures cover the subjects Operating Systems and Computer Networks, IS Security, IT for e-business and their equivalents in English.<\/p>\n\n\n\n<p>Students are required to graduate<strong>&nbsp;at least one<\/strong>&nbsp;a professional lecture (or two, if specified in the course) of your own choice from the given cycle (condition for credit). Of course, the student can register for more than one lecture. Registration is done via forms on the KIT website (see below). The lecture cycle runs as standard from March 2026&nbsp;<strong>on Tuesday from 5:30 PM in the TI classroom<\/strong><strong>.<\/strong>&nbsp;The cycle runs until the end of April 2026.<\/p>\n\n\n\n<p>Registration of students for lectures will be ongoing&nbsp;<strong>from February 24, 2026&nbsp;<\/strong>through the department&#039;s website.<\/p>\n\n\n\n<p>Attendance will be recorded at the lectures!<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/kit.pef.czu.cz\/en\/informace-k-systemu-dochazky-na-cyklus-prednasek-odborniku-z-praxe-ict\/\">Read carefully the Information on the system of attendance at the Cycle of lectures by ICT experts<\/a><\/strong><\/p>\n\n\n\n<p><strong>ATTENTION! The completed lecture can be counted as part of the credit within the mandatory bachelor&#039;s internship! To count it, you need to register on the JOBS PEF \u010cZU portal. More information about bachelor&#039;s internships can be found at <a href=\"https:\/\/jobs.pef.czu.cz\/bakalarska-praxe\">https:\/\/jobs.pef.czu.cz\/bakalarska-praxe<\/a>.<\/strong><br><em>(Registration on the website kit.pef.czu.cz serves to check recorded attendance within the framework of credits, registration on the portal jobs.pef.czu.cz serves to recognize lectures associated with bachelor&#039;s practice.)<\/em><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Date<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Topic of the lecture<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Lecturer<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Company\/position<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Room<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Language<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Login<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>10. 03. 2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Security threats<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Jan Vaclavik<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Fortinet<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>YOU<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><em>English<\/em><\/td><td class=\"has-text-align-center\" data-align=\"center\">IT HAPPENED<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><br>The lecture will provide an overview of current cyber threats and typical attack scenarios (phishing, ransomware, vulnerability exploitation, cloud). It will focus on attackers&#039; tactics and key principles of prevention, detection and incident response, including practical recommendations for increasing the resilience of information systems.<br><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Date<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Topic of the lecture<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Lecturer<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Company\/position<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Room<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Language<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Login<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>11. 03. 2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>IoT Wireless networks<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Vojtech Novak<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>JoTio<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>II<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><em>English<\/em><\/td><td class=\"has-text-align-center\" data-align=\"center\">IT HAPPENED<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><br>This lecture introduces IoT wireless networks and their role in connecting smart devices and systems. It provides a brief overview of key wireless communication technologies, their advantages and limitations, and practical factors for selecting the right network for different IoT applications.<br><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Date<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Topic of the lecture<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Lecturer<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Company\/position<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Room<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Language<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Login<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>24. 03. 2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>The future of cybersecurity<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Andrej Jelenik<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>CISCO<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>YOU<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><em>English<\/em><\/td><td class=\"has-text-align-center\" data-align=\"center\">IT HAPPENED<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><br>The lecture will present the latest trends in cybersecurity, including the use of AI to protect people and organizations, support for the secure development of AI tools, and preparation for quantum technologies from the perspective of&nbsp;<strong>Post-Quantum Cryptography (PQC)<\/strong>.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Date<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Topic of the lecture<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Lecturer<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Company\/position<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Room<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Language<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Login<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>07. 04. 2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>How not to *** your first e-shop<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Ivo Barena<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Shoptet<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>YOU<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><em>English<\/em><\/td><td class=\"has-text-align-center\" data-align=\"center\">IT HAPPENED<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><br><em><em>Do you want to build your own e-shop and make millions, but are you afraid that you&#039;ll blow it all before you sell your first sock? In this lecture, I&#039;ll tell you straight-up how to avoid embarrassing yourself, drowning in nonsense, and throwing money out the window.<br>We&#039;ll discuss the most common mistakes made by newbies - from choosing the wrong platform to tragic marketing to logistical horror. If you don&#039;t want your e-shop to end up abandoned in the internet graveyard, come and hear what to do and, most importantly, what not to do!&nbsp;<\/em><\/em><br><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Date<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Topic of the lecture<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Lecturer<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Company\/position<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Room<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Language<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Login<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>14. 04. 2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>IQRF mesh networks \u2013 implementation <\/strong><br><strong>and administration<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Ivona Spurn\u00e1<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>IQRF Alliance<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>YOU<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><em>English<\/em><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/forms.gle\/coLTjoT39iri2L6D6\" data-type=\"link\" data-id=\"https:\/\/forms.gle\/coLTjoT39iri2L6D6\">REGISTRATION<\/a><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><br><em>Thanks to its mesh topology, it is among the most reliable wireless networks ever. You will cover large areas of the order of many square kilometers, for example parking lots, industrial halls, hotels, streets, offices, etc. However, what more can Mesh networks provide to their users? You will learn that at the lecture.<\/em><br><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The Department of Information Technology is once again organizing a separate series of professional lectures on current topics in the field of Information and Communication Technologies in the 2025\/2026 academic year. The lectures offered will be gradually available from the recording during the academic year. Out of a total of 5 lectures offered, one is in English. The lecture series takes place in the 2025\/2026 academic year (March to April). The aim is primarily to enrich and supplement standard teaching, support the competitiveness of graduates on the labor market, and further deepen the department&#039;s cooperation with practice. In addition to the actual thematic content of the lecture, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc. The chosen<\/p>","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[46,119,79,48],"tags":[],"class_list":["post-13845","post","type-post","status-publish","format-standard","hentry","category-akce","category-prednasky-odborniku","category-homepage","category-prednasky"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Eva K\u00e1nsk\u00e1","author_link":"https:\/\/kit.pef.czu.cz\/en\/zpravy-akce-prednasky\/author\/kanska\/"},"uagb_comment_info":0,"uagb_excerpt":"Katedra informa\u010dn\u00edch technologi\u00ed op\u011bt po\u0159\u00e1d\u00e1 v LS 2025\/2026 samostatn\u00fd cyklus odborn\u00fdch p\u0159edn\u00e1\u0161ek na aktu\u00e1ln\u00ed t\u00e9mata z oblasti Informa\u010dn\u00edch a komunika\u010dn\u00edch technologi\u00ed. Nab\u00edzen\u00e9 p\u0159edn\u00e1\u0161ky budou postupn\u011b v pr\u016fb\u011bhu akademick\u00e9ho roku k dispozici ze z\u00e1znamu. Z celkem 5 nab\u00edzen\u00fdch p\u0159edn\u00e1\u0161ek je jedna v anglick\u00e9m jazyce. Cyklus p\u0159edn\u00e1\u0161ek prob\u00edh\u00e1 v LS (obdob\u00ed b\u0159ezen a\u017e duben). C\u00edlem je p\u0159edev\u0161\u00edm&hellip;","_links":{"self":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/comments?post=13845"}],"version-history":[{"count":21,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13845\/revisions"}],"predecessor-version":[{"id":13934,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/posts\/13845\/revisions\/13934"}],"wp:attachment":[{"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/media?parent=13845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/categories?post=13845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kit.pef.czu.cz\/en\/wp-json\/wp\/v2\/tags?post=13845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}