University lecture on "IT Security" as Open Educational Resources material by BjΓΆrn Kimminich
- Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies)
- Security Goals (Confidentiality, Integrity, Availability)
- Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers)
- Network Security (VPN, Wireless Security, Firewalls/IDS/IPS/WAF)
- Encryption (WEP/WPA2, SSL/TLS, PGP, Disk Encryption)
- Security Management & Organization
- Threat Modeling
- Penetration Testing
- Open Web Application Security Project (OWASP)
- Cross-Site Scripting (XSS)
- Injection
- Authentication Flaws
- Authorization Flaws
- Sensitive Data
- Insecure Dependencies & Configuration
- XXE & Deserialization
- Secure Development Lifecycle
Branch | Edition | Lessons | Duration (per lesson) | Interactivity | Exercises | Homework |
---|---|---|---|---|---|---|
master |
IT Security Lecture | 17 | ~150min | π¬π¬π¬ | π»π» | π π |
webinar |
Web Application Security Webinar | 9 | ~120min | π¬ | π» | π π π |
workshop |
Hands-on Hacking Workshop | 4 | ~90min | π¬π¬ | π»π»π» | π |
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.