The study field will help you understand the principles of security risks. You will get to know the meaning of security measures in information systems. You will learn the principles of dealing with new procedures that lead to their design, installation, operation and maintenance. Upon graduation, you may become an information or general software systems designer, programmer, security architect, information systems administrator and security administrator. You will work in software systems development and research departments.
Information technology moves the world
-
79 %
students gain practical experience
-
98 %
students successfully pass the State Final Examination
-
99 %
graduates find work in the month
-
40 938 Kč
is the average starting salary for graduates
1st Year
Compulsory Programme Courses - Winter
Compulsory Programme Courses - Summer
The common basis of the programme
The common core of the program consists of courses that will give you the knowledge important for all IT engineers:
- Computation Systems Architectures will teach you how to think about how your code will run on modern computing platforms, how to think about programming in a way that makes the most efficient use of resources, i.e., that your application makes the best use of the power of modern platforms, makes efficient use of system memory resources, and is also efficient in terms of energy consumed.
- Functional and Logic Programming will teach you that although classical imperative programming is a very widely used paradigm and is very close to machine-level implementation, there are other approaches that will give you a new perspective on some key problems and help you get novel and often more efficient solutions to them.
- Modern Trends in Informatics (in English) you need to know to see where the field is going and what to expect in practice in a few years.
- Parallel and Distributed Algorithms is a course that will show you the patterns, limits, and pitfalls of parallel and distributed algorithmic solutions and the associated synchronization mechanisms, without which you will hardly succeed in solving many of the more complex problems.
- Statistics and probability is the right hand of every engineer to process numerical results of experiments or data obtained while running your application, analyze them and learn from them to make further decisions is almost his daily bread.
- Theoretical Computer Science shows the limits of computer science capabilities through formal languages and mathematical models of computation. This is the only way to understand whether your problem is even solvable and, if so, with what resources and means to prove it.
- Data Storage and Preparation, especially big data, and extracting knowledge from it is a valuable art to any computer scientist. It is a key aspect that strongly influences the effectiveness of many solutions and applications.
- Artificial Intelligence and Machine Learning is a course where you will learn how to teach computers to understand our world and make them solve problems that are easy for humans but difficult for an algorithmic machine to handle.
Recommended course compositions
Cybersecurity
1st year of study, winter semester
- Computation Systems Architectures
- Information System Security
- Statistics and Probability
- Theoretical Computer Science
- Secure Coding
1st year of study, summer semester
- Advanced Information Systems
- Cryptography
- Functional and Logic Programming
- Modern Trends in Informatics (in English)
- Parallel and Distributed Algorithms
- Digital Forensics (in English)
2nd year of study, winter semester
- Artificial Intelligence and Machine Learning
- Biometric Systems
- Data Storage and Preparation
- Semester Project
- Wireless and Mobile Networks
2nd year of study, summer semester
They will pass on all their knowledge and hold you in difficult moments
What are we talking about?
-
We cordially invite you to a public professorial lecture: High Performance Computing in Personalized Ultrasound Medicine. It will take place on Friday, May 3, at 11 a.m. in lecture room E 104 and is part of the professorial proceedings.This lecture will take you on an engaging journey from humble …
-
Voice deepfakes can't be detected by humans or security systems. Attacks on the rise
Spreading alarm messages or disclosing confidential company or bank data. Artificial intelligence is developing rapidly and almost anyone can create deepfake voice recordings at home and in high quality. …
Come to FIT!
Other Master
Specializations
-
Application Development
-
Bioinformatics and Biocomputing
-
Computer Graphics and Interaction
-
Computer Networks
-
Computer Vision
-
Cyberphysical Systems
-
Cybersecurity
-
Embedded Systems
-
High Performance Computing
-
Information Systems and Databases
-
Intelligent Devices
-
Intelligent Systems
-
Machine Learning
-
Mathematical Methods
-
Software Engineering
-
Software Verification and Testing
-
Sound, Speech and Natural Language Processing