Article
Version 1
Preserved in Portico This version is not peer-reviewed
Experience Teaching Mathematics at the University of Defence in the Study Field of Cybersecurity
Version 1
: Received: 3 July 2024 / Approved: 3 July 2024 / Online: 4 July 2024 (07:01:11 CEST)
How to cite: Potůček, R. Experience Teaching Mathematics at the University of Defence in the Study Field of Cybersecurity. Preprints 2024, 2024070350. https://doi.org/10.20944/preprints202407.0350.v1 Potůček, R. Experience Teaching Mathematics at the University of Defence in the Study Field of Cybersecurity. Preprints 2024, 2024070350. https://doi.org/10.20944/preprints202407.0350.v1
Abstract
The teaching of mathematics at the Faculty of Military Technology of the University of Defense in the first two years of the five-year Military master’s degree is divided into the teaching of students in four specializations: Military Technologies – Mechanical, Military Technologies – Electrical, Military Geography and Cartography, and Cybersecurity. The article discusses the previous five-year experience in teaching the subjects Mathematics I, Mathematics II, Mathematics III, and Graph theory for the specialization in Cybersecurity, that the author of the paper gained while teaching, as a guarantor of these four subjects. The article provides an overview of the topics that are covered, typical exam assignments, and an evaluation of the results of the semester exams in the five years since the accreditation of the Cybersecurity specialization was granted.
Keywords
University of Defence; Faculty of Military Technology; Cybersecurity study program; teaching mathematics; teaching graph theory; semester exam; classified credit test, thematic units; exam evaluation.
Subject
Computer Science and Mathematics, Discrete Mathematics and Combinatorics
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment