Updating search results...

Search Resources

2 Results

View
Selected filters:
  • secure-development-lifecycle
University lecture on "IT Security"
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Semester 1 - Information & Network Security
* Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies)
* Security Goals (Confidentiality, Integrity, Availability)
* Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers)
* Network Security (VPN, Wireless Security, Firewalls/IDS/IPS/WAF)
* Encryption (WEP/WPA2, SSL/TLS, PGP, Disk Encryption)
* Security Management & Organization
* Threat Modeling
* Penetration Testing

Semester 2 - Application Security & SDLC
* Open Web Application Security Project (OWASP)
* Cross-Site Scripting (XSS)
* Injection
* Authentication Flaws
* Authorization Flaws
* Sensitive Data
* Insecure Dependencies & Configuration
* XXE & Deserialization
* Secure Development Lifecycle

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Lecture
Author:
Björn Kimminich
Date Added:
10/17/2019