IT-Security Students attending this lecture will master the basic terms, concepts and principles of communication security and information assurance. They are able to assess security problems of computer networks in companies and can implement measures to protect the systems against attacks. Students understand basic methods of cryptography and are familiar with their application in security technologies. Based on selected vulnerabilities and threats, students gain experience to evaluate and apply security solutions and techniques to protect computer networks. Students have the skills to introduce, evaluate and maintain a company-wide security policy.

Content of this Course:

  • Embedding IT Security into Business Processes and the Company‚Äôs Environment:
    • Security Policies
    • Aspects of Vulnerability and Risk Management
    • Legal Guidelines
    • Security Awareness
  • Introduction to Threats, Risks and Attacks:
    • Malware
    • Spoofing
    • Man-in-the-Middle
    • Phishing
  • Overview of Security Criteria:
    • Confidentiality
    • Integrity
    • Authenticity
    • Availability
  • Fundamentals of Cryptography:
    • Encryption
    • Integrity
    • Authentication
    • Access Control
  • Selected Methods of Cryptography:
    • AES
    • RSA
    • EIGamal
    • Elliptic Curve Systems
  • Network Security:
    • Firewall Architectures
    • Intrusion Detection and Prevention Systems (IDS and IPS)
    • Virtual Private Network (PPTP, IPSec, TLS, SSH)
  • Authentication Protocols (Challenge Response, Zero-Knowledge) and their Realization in Distributed Systems (RADIUS, Kerberos)
  • WLAN Security
  • PKI as a Secure Infrastructure
  • Actual Security Related Problems

last modified: 21.01.2020 09:47