Internet Technology

IT Security

Integrated course, 2.00 ECTS


Course content

 Introduction into the area of IT-Security based on offensive and defensive views


-       Motivation

-       Wo are the enemies

-       Target selection

-       Information Gathering

-       Secure Coding, writing exploits

-       WEB Security attack & defense

-       WiFi Security attack & defense

-       Harmless executables

Learning outcomes

Students know about IT-Security threats and are able to develop appropriate mitigation strategies.

Recommended or required reading and other learning resources / tools

-       Hacking Exposed: Web Application Security Secrets & Solutions, Joel Scambray

-       Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure

-       Google Hacking for Penetration Testers, Johnny Long

-       Forbidden Code, Joe Erickson

-       XSS Attacks: Cross Site Scripting Exploits and Defense, Seth Fogie

-       Aggressive Network Self-Defense, Neil R. Wyler
The Art of Exploitation, Jon Erickson

Mode of delivery

1 ECTS lecture, 1 ECTS tutorial with a high amount of practical work

Prerequisites and co-requisites

Operating Systems

Network technologies

Programming skills

Assessment methods and criteria

Lecture: final examination
Tutorial: continuous assessment