Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bkimminich/it-security-lecture
University lecture on "IT Security" as Open Educational Resources material
https://github.com/bkimminich/it-security-lecture
Last synced: 3 months ago
JSON representation
University lecture on "IT Security" as Open Educational Resources material
- Host: GitHub
- URL: https://github.com/bkimminich/it-security-lecture
- Owner: bkimminich
- License: other
- Archived: true
- Created: 2018-06-08T09:24:20.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2023-08-18T22:41:18.000Z (about 1 year ago)
- Last Synced: 2024-07-27T19:16:58.638Z (3 months ago)
- Size: 141 MB
- Stars: 363
- Watchers: 20
- Forks: 157
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- Crypto-OpSec-SelfGuard-RoadMap - IT security lecture
- Crypto-OpSec-SelfGuard-RoadMap - IT security lecture
README
# IT Security Lecture
[![OER Commons](https://img.shields.io/badge/OER-Commons-yellowgreen)](https://www.oercommons.org/courses/university-lecture-on-it-security)
[![AppVeyor](https://img.shields.io/appveyor/ci/bkimminich/it-security-lecture)](https://ci.appveyor.com/project/bkimminich/it-security-lecture)
![GitHub repo size](https://img.shields.io/github/repo-size/bkimminich/it-security-lecture)University lecture on "IT Security" as
[Open Educational Resources](https://www.unesco.org/en/communication-information/open-solutions/open-educational-resources)
material by [BjΓΆrn Kimminich](http://kimminich.de)[![OER Global Logo, 2012 J. Mello, used under CC-BY 3.0 License](oer_logo.png)](https://www.unesco.org/en/communication-information/open-solutions/open-educational-resources
"OER Global Logo, 2012 J. Mello, used under CC-BY 3.0 License")> π¨ This repository is archived! There are no more updates planned at this point in time! π¨
## Covered Topics
### Semester 1 - Information & Network Security
1. [Motivation](slides/01-01-motivation.md) (Vulnerabilities, Exploits,
Threat Actors, Case Studies)
2. [Security Goals](slides/01-02-security_goals.md) (Confidentiality,
Integrity, Availability)
3. [Malware](slides/01-03-malware.md) (Viruses, Worms, Trojans, Botnets,
Ransomware, Cryptojackers)
4. [Network Security](slides/01-04-network_security.md) (VPN, Wireless
Security, Firewalls/IDS/IPS/WAF)
5. [Encryption](slides/01-05-encryption.md) (WEP/WPA2, SSL/TLS, PGP,
Disk Encryption)
6. [Security Management & Organization](slides/01-06-security_mgmt_and_org.md)
7. [Threat Modeling](slides/01-07-threat_modeling.md)
8. [Penetration Testing](slides/01-08-penetration_testing.md)### Semester 2 - Application Security & SDLC
1. [Open Web Application Security Project](slides/02-01-owasp.md)
(OWASP)
3. [Injection](slides/02-02-injection.md)
2. [Cross-Site Scripting (XSS)](slides/02-03-xss.md)
4. [Authentication Flaws](slides/02-04-authentication_flaws.md)
5. [Authorization Flaws](slides/02-05-authorization_flaws.md)
6. [Cryptographic Failures](slides/02-06-cryptographic_failures.md)
7. [Insecure Dependencies & Configuration](slides/02-07-insecure_dependencies_and_configuration.md)
8. [Software & Data Integrity Failures](slides/02-08-integrity_failures.md)
9. [Secure Development Lifecycle](slides/02-09-sdlc.md)----
[![CC BY SA 4.0](cc_by-sa_4.0.svg)](https://creativecommons.org/licenses/by-sa/4.0/)
This work is licensed under a
[Creative Commons Attribution-ShareAlike 4.0 International License](https://creativecommons.org/licenses/by-sa/4.0/).