• Zielgruppen
  • Suche
 

Introduction to Computer Security


Organisatorisches: Dieser Kurs findet als Fernkurs in Kooperation mit der Uni Göttingen statt, geeignet für B.Sc. und M.Sc. Studierende.

Gewichtung:  5 CP (schriftliche Prüfung)

Ansprechpartner Hannover: Olivia Buber

Ansprechpartner Göttingen: Christian Wressnegger

Webseite: http://www.uni-goettingen.de/de/516003.html 

Person Responsible: Prof. Dr. Rieck, Konrad (Göttingen)

Start: Vorlesung: 28.10.2015, Übung: 29.10.2015

 

Module Description:

This course deals with principles of computer and network security. The course covers basic concepts of security and introduces common attacks and defenses. Topics of the course include basic cryptography, authentication and authorization, vulnerabilities and attacks, malicious software, and privacy aspects.

Outcomes:

After successful completion of the modul students are able to
- Describe and apply symmetric-key cryptosystems
- Describe and apply public-key cryptosystems
- Apply and compare mechanisms for authentication and access control
- Explain attacks on different networks layers
- Apply and compare defenses against network attacks
- Identify vulnerabilities in software and use countermeasures
- Describe types and mechanisms of malware
- Apply and compare methods for intrusion and malware detection
- Describe and use honeypot and sandbox systems

Recommended Literature:

M. Bishop: Computer Security - Art and Science. Macmillian Publishing, 2002
D. Gollmann: Computer Security. Wiley & Sons, 2011
B. Schneier: Applied Cryptography. Wiley & Sons, 1995
P. Szor: The Art of Computer Virus Research and Defense. Addison-Wesley, 2005


Recommended Prerequisite Knowledge:

none

Miscellaneous & Comments:

This is a lecture with exercises. You need to solve 50% of the exercise sheets to take part in the written exam. The exam will take place on 10.02.2016 from 16:00–18:00. You need to register for the exam with the examination office. The exam will be in English.

There is a maling list for the lecture. News and updates regarding the schedule are posted to this list. Furthermore, the list allows students to discuss topics of the lecture:

https://listserv.gwdg.de/mailman/listinfo/sec-ics


Teaching methods:

Slide presentation; practical exercises, Live streaming