Choose from Our Courses

For employees, students, and IT administrators at Masaryk University

Individual Online Courses

Online courses that you can attend from your couch.

We have selected practical information for you and prepared understandable guides that will help you take responsible care of yourself in the cyber environment. Invest in yourself and gain skills that universities, employers, and even you will truly value and utilize.

Cyber Compass

The navigator to the golden middle way in the cybersecurity world

What are social engineering techniques and how to defend yourself if you encounter them? You will learn this through nine engaging stories of different people who faced this type of cyber attack.

Social Engineering

Stories of frequent social engineering techniques 

Group Training for Students and Employees

On-site/online training offers, where you can improve your cybersecurity habits in a practical way with our instructors. If you are interested in training, please contact us at

Cybersecurity Basics

The goal of the training is to provide participants with a basic understanding of cybersecurity issues, enabling them to navigate the online space safely.

Target Group: MU students/employees
Format: In-person or online, groups of up to 15 people
Duration: 90 minutes (in-person or online)
Topics Covered: passwords, password managers, phishing, secure devices, backup, ransomware, encrypted communication, reporting security incidents.

Cybersecurity for MU Employees

The aim of the training is to acquaint employees with internal regulations and directives regarding cybersecurity and to build their basic awareness of threats and related principles that MU employees may encounter in their regular activities in the cyber environment.

Target Group: MU employees
Format: In-person or online, groups of up to 15 people
Duration: 120 minutes
Topics Covered: device security (physical vs. virtual), data and everything related to it, pitfalls of electronic communication, working with passwords, cyber threats, incident reporting.

Social Engineering and the Most Common Attack Types

In this training, we introduce participants to the issue of social engineering. Using real-life examples, we demonstrate how attackers attempt to access sensitive information and what to be cautious of.

Target Group: MU students/employees
Duration: 90 minutes
Format: In-person or online, groups of up to 15 people
Topics Covered: social engineering, phishing, vishing, smishing, scareware.

Our Tutors

Pavel Brejcha

He completed Security and Strategic Studies at Masaryk University and worked as an intern at the National Cyber and Information Security Agency. He participated in the Erasmus program, where he studied at the University of Defence in Warsaw and worked for a non-profit in Estonia. At CSIRT-MU, he is responsible for creating e-learning courses, writing popularization articles, and lecturing. In addition, he also teaches media literacy and cybersecurity topics in Fakescape. In his free time, he engages in modern technologies and playing strategic games.


No description

No description

Dávid Magušin

In the team, he primarily focuses on analyzing user needs and subsequently preparing customized educational materials. The goal is to enhance user security in cyberspace in the way they prefer the most. He completed his bachelor's degree at Comenius University in Bratislava. He studied liberal arts at Anton Neuwirth College and holds a master's degree in security and strategic studies from the Faculty of Social Studies at Masaryk University. His professional interest is mainly in cybersecurity and conducting awareness in security - that's why he founded and manages the "Bezpečák" page on Facebook in his free time. Besides, his long-standing passions are football, playing the guitar, and calisthenics.

Online Courses for IT Administrators

Experts from CSIRT-MU have created several online courses for IT administrators as part of the Bootcamp project in 2020-2021. Alongside a comprehensive cybersecurity course for IT administrators, four specialized courses were developed, focusing on incident handling, penetration testing, and forensic analysis of machines and networks. The courses cover both procedural and technological aspects of the mentioned topics.

If you are interested in taking these courses, please get in touch with us at

You are running an old browser version. We recommend updating your browser to its latest version.

More info