GitXplorerGitXplorer
b

it-security-lecture

public
372 stars
154 forks
0 issues

Commits

List of commits on branch master.
Verified
38405ec5f6e1d316d086d01aac994a94a12b171a

Add archiving note

bbkimminich committed a year ago
Unverified
c6c416fcbd3bb81744cb092dac242b3f3f5b6328

Pushing PDFs generated by AppVeyor build 170 for 21a657be999aff0cf78ae3cce85806b17762e003

bbkimminich committed 2 years ago
Verified
21a657be999aff0cf78ae3cce85806b17762e003

Fix name of feedback screen

bbkimminich committed 2 years ago
Unverified
247bf62a64a1a4e2d07208cf51b57915321555ea

Pushing PDFs generated by AppVeyor build 169 for e74db7f4262449b44bf08e34361c11b4bbcbfd6d

bbkimminich committed 2 years ago
Verified
e74db7f4262449b44bf08e34361c11b4bbcbfd6d

Add 100-points marker to centralized authentication

bbkimminich committed 2 years ago
Unverified
88a1c68a5ae7f9c5ada67c18ce65014976cf792b

Pushing PDFs generated by AppVeyor build 168 for 677b2376c153455e056063864991ee89f4462745

bbkimminich committed 2 years ago

README

The README file for this repository.

IT Security Lecture

OER Commons AppVeyor GitHub repo size

University lecture on "IT Security" as Open Educational Resources material by Björn Kimminich

OER Global Logo, 2012 J. Mello, used under CC-BY 3.0 License

🚨 This repository is archived! There are no more updates planned at this point in time! 🚨

Covered Topics

Semester 1 - Information & Network Security

  1. Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies)
  2. Security Goals (Confidentiality, Integrity, Availability)
  3. Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers)
  4. Network Security (VPN, Wireless Security, Firewalls/IDS/IPS/WAF)
  5. Encryption (WEP/WPA2, SSL/TLS, PGP, Disk Encryption)
  6. Security Management & Organization
  7. Threat Modeling
  8. Penetration Testing

Semester 2 - Application Security & SDLC

  1. Open Web Application Security Project (OWASP)
  2. Injection
  3. Cross-Site Scripting (XSS)
  4. Authentication Flaws
  5. Authorization Flaws
  6. Cryptographic Failures
  7. Insecure Dependencies & Configuration
  8. Software & Data Integrity Failures
  9. Secure Development Lifecycle

CC BY SA 4.0

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.