University lecture on "IT Security" as Open Educational Resources material by Björn Kimminich
- Motivation (Vulnerabilities, Exploits, Threat Actors, Case Studies) (:heavy_check_mark:)
- Security Goals (Confidentiality, Integrity, Availability) (:heavy_check_mark:)
- Malware (Viruses, Worms, Trojans, Botnets, Ransomware, Cryptojackers) (:heavy_check_mark:)
- Network Security (VPN, WLAN, Firewalls/IDS/IPS/WAF)
- Encryption (SSL/TLS, PGP)
- Security Management & Organization
- Threat Modelling
- Risk Assessments
- Penetration Tests & Security Automation
- Open Web Application Security Project (OWASP) (:heavy_check_mark:)
- Cross-Site Scripting (XSS) (:heavy_check_mark:)
- Injection (:heavy_check_mark:)
- Authentication Flaws (:heavy_check_mark:)
- Authorization Flaws (:heavy_check_mark:)
- Sensitive Data (:heavy_check_mark:)
- Insecure Dependencies & Configuration (:heavy_check_mark:)
- XXE & Deserialization (:heavy_check_mark:)
- Secure Development Lifecycle (:heavy_check_mark:)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.