ITsec2 Chapter1 Introduction
ITsec2 Chapter1 Introduction
ITsec2 Chapter1 Introduction
2
Example Schedule for Three Weeks
3
Exercises
4
Exams
§ Exam:
§ Written exam of 90 minutes at the end of the semester
§ Registration for the exam via RWTH Online
§ Your grade will depend on the exam
5
Overall Context: LuFG IT-Sec Teaching
§ Lectures
§ IT-Security 1: Cryptographic Basics and Network Security
§ IT-Security 2: Malware and Defenses, Privacy, and Applications Security
§ MobSec: Security in Mobile Networks
§ Datenkommunikation und Sicherheit
§ Seminars
§ Proseminar or Seminar on changing topics
§ Typically taught in summer terms
§ Practical Course
§ Security Lab, also known as Hacking Lab
6
Dependencies
§ IT-Security 2
§ Does NOT require IT-Security 1 but basic cryptographic knowledge
§ Datkom-knowledge will suffice to understand the content
§ BUT we recommend one of {Crypto, IT-Security 1} at least in parallel
§ MobSec
§ Does NOT require IT-Security 1 but basic cryptographic knowledge
§ BUT one of {Crypto, IT-Security 1} at least in parallel
7
Research and Master/Bachelor Thesis Topics
Gaming
Content Didactic
max: y
8
IT-Security 2: Topics Planned
§ Software Security
§ Types of Malware
§ Spreading § Privacy
§ Exploits § Anonymous Communication
§ Examples § Payment Systems
§ Secure Multi-Party
§ … and Defenses Computation
§ E-Voting
§ AV-Products
§ E-Auctions
§ Honeypots
§ Biometrics
§ Malware Analysis
§ Access control
§ Firewalls
§ Intrusion Detection
9
Books
10