GitXplorerGitXplorer
b

it-security-lecture

public
372 stars
154 forks
0 issues

Commits

List of commits on branch master.
Unverified
677b2376c153455e056063864991ee89f4462745

Move "Christmas Special" exercise to authorization

bbkimminich committed 2 years ago
Unverified
29852632c32383bff713a8fd5f6952793dd71ded

Pushing PDFs generated by AppVeyor build 167 for a4b0cec5903665690c50cff28161a2ec530f055e

bbkimminich committed 2 years ago
Unverified
a4b0cec5903665690c50cff28161a2ec530f055e

Update data breach screenshot

bbkimminich committed 2 years ago
Verified
0c040c085778782bd16b3b54fed8b9ec702500d6

Merge pull request #50 from alex1701c/master

bbkimminich committed 2 years ago
Unverified
f0a62a166297109b7b54cbd84e544728eae9e660

Pushing PDFs generated by AppVeyor build 166 for ec39071ec7ada31bb7facdb15bf50d53772b04c5

bbkimminich committed 2 years ago
Verified
ec39071ec7ada31bb7facdb15bf50d53772b04c5

Merge pull request #51 from wurstbrot/patch-4

bbkimminich committed 2 years ago

README

The README file for this repository.

IT Security Lecture

OER Commons AppVeyor GitHub repo size

University lecture on "IT Security" as Open Educational Resources material by Björn Kimminich

OER Global Logo, 2012 J. Mello, used under CC-BY 3.0 License

🚨 This repository is archived! There are no more updates planned at this point in time! 🚨

Covered Topics

Semester 1 - Information & Network Security

  1. Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies)
  2. Security Goals (Confidentiality, Integrity, Availability)
  3. Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers)
  4. Network Security (VPN, Wireless Security, Firewalls/IDS/IPS/WAF)
  5. Encryption (WEP/WPA2, SSL/TLS, PGP, Disk Encryption)
  6. Security Management & Organization
  7. Threat Modeling
  8. Penetration Testing

Semester 2 - Application Security & SDLC

  1. Open Web Application Security Project (OWASP)
  2. Injection
  3. Cross-Site Scripting (XSS)
  4. Authentication Flaws
  5. Authorization Flaws
  6. Cryptographic Failures
  7. Insecure Dependencies & Configuration
  8. Software & Data Integrity Failures
  9. Secure Development Lifecycle

CC BY SA 4.0

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.