University lecture on "IT Security" as Open Educational Resources material by Björn Kimminich
- Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies) (:heavy_check_mark:)
- Security Goals (Confidentiality, Integrity, Availability) (:heavy_check_mark:)
- Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers) (:heavy_check_mark:)
- Network Security (VPN, Wireless Security, Firewalls/IDS/IPS/WAF) (:heavy_check_mark:)
- Encryption (WEP/WPA2, SSL/TLS, PGP, Disk Encryption) (:heavy_check_mark:)
- Security Management & Organization (:heavy_check_mark:)
- Threat Modeling (:heavy_check_mark:)
- Penetration Testing (:heavy_check_mark:)
- Open Web Application Security Project (OWASP) (:heavy_check_mark:)
- Cross-Site Scripting (XSS) (:heavy_check_mark:)
- Injection (:heavy_check_mark:)
- Authentication Flaws (:heavy_check_mark:)
- Authorization Flaws (:heavy_check_mark:)
- Sensitive Data (:heavy_check_mark:)
- Insecure Dependencies & Configuration (:heavy_check_mark:)
- XXE & Deserialization (:heavy_check_mark:)
- Secure Development Lifecycle (:heavy_check_mark:)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.