We have selected practical information for you and prepared understandable guides that will help you take responsible care of yourself in the cyber environment. Invest in yourself and gain skills that universities, employers, and even you will truly value and utilize.
Choose from Our Courses
For employees, students, and IT administrators at Masaryk University
What are social engineering techniques and how to defend yourself if you encounter them? You will learn this through nine engaging stories of different people who faced this type of cyber attack.
Stories of frequent social engineering techniques
In collaboration with the Etech team, we have prepared an introductory training for MU employees available in IS MU.
The minimum dose of recommendations for a safer university
Group Training for Students and Employees
On-site/online training offers, where you can improve your cybersecurity habits in a practical way with our instructors. If you are interested in training, please contact us at vzdelavani@csirt.muni.cz.
Cybersecurity Basics
The goal of the training is to provide participants with a basic understanding of cybersecurity issues, enabling them to navigate the online space safely.
Target Group: MU students/employees
Format: In-person or online, groups of up to 15 people
Duration: 90 minutes (in-person or online)
Topics Covered: passwords, password managers, phishing, secure devices, backup, ransomware, encrypted communication, reporting security incidents.
Cybersecurity for MU Employees
The aim of the training is to acquaint employees with internal regulations and directives regarding cybersecurity and to build their basic awareness of threats and related principles that MU employees may encounter in their regular activities in the cyber environment.
Target Group: MU employees
Format: In-person or online, groups of up to 15 people
Duration: 120 minutes
Topics Covered: device security (physical vs. virtual), data and everything related to it, pitfalls of electronic communication, working with passwords, cyber threats, incident reporting.
Social Engineering and the Most Common Attack Types
In this training, we introduce participants to the issue of social engineering. Using real-life examples, we demonstrate how attackers attempt to access sensitive information and what to be cautious of.
Target Group: MU students/employees
Duration: 90 minutes
Format: In-person or online, groups of up to 15 people
Topics Covered: social engineering, phishing, vishing, smishing, scareware.
Our Tutors
Pavel Brejcha
He completed Security and Strategic Studies at Masaryk University and worked as an intern at the National Cyber and Information Security Agency. He participated in the Erasmus program, where he studied at the University of Defence in Warsaw and worked for a non-profit in Estonia. At CSIRT-MU, he is responsible for creating e-learning courses, writing popularization articles, and lecturing. In addition, he also teaches media literacy and cybersecurity topics in Fakescape. In his free time, he engages in modern technologies and playing strategic games.
Dávid Magušin
In the team, he primarily focuses on analyzing user needs and subsequently preparing customized educational materials. The goal is to enhance user security in cyberspace in the way they prefer the most. He completed his bachelor's degree at Comenius University in Bratislava. He studied liberal arts at Anton Neuwirth College and holds a master's degree in security and strategic studies from the Faculty of Social Studies at Masaryk University. His professional interest is mainly in cybersecurity and conducting awareness in security - that's why he founded and manages the "Bezpečák" page on Facebook in his free time. Besides, his long-standing passions are football, playing the guitar, and calisthenics.
Online Courses for IT Administrators
Experts from CSIRT-MU have created several online courses for IT administrators as part of the Bootcamp project in 2020-2021. Alongside a comprehensive cybersecurity course for IT administrators, four specialized courses were developed, focusing on incident handling, penetration testing, and forensic analysis of machines and networks. The courses cover both procedural and technological aspects of the mentioned topics.
If you are interested in taking these courses, please get in touch with us at vzdelavani@csirt.muni.cz.
Cybersecurity Overview for IT Administrators
The comprehensive course for IT administrators covers responses to cyber threats, introduces the role of the CSIRT team, teaches preventive measures against attacks, protection of infrastructure, penetration testing, and forensic analysis of both the system and network.
Penetration Testing
Computer Security Incident Response
The course provides an overview of responses to cyber threats and introduces the role and methods of the CSIRT team in handling security incidents.
Digital Forensics
The course addresses the issues of forensic analysis of systems. This includes procedures for evidence collection and incident investigation when working with file systems and the operating memory of personal computers and servers.
Defense
The course familiarizes participants with preventive measures to reduce the impact of cyber attacks, infrastructure protection, and the use of network segmentation, firewalls, and endpoint protection.
Network Forensics
The course covers the area of forensic analysis of network traffic. It focuses on network traffic, users, services, and their interactions to identify network issues and detect abnormal behavior, malicious traffic, and intruders.