Information Security Assessment and Operations

Lecture Announcement 2024

 

For 2024, we are changing the mode of our Security A&O lecture a little bit, as we are switching from videos and online lectures to in-person block lectures. Here we are going to have two lecture blocks of two whole days each. The first blocks will be on 29.-30. of April and the second blocks will be on 3.-4. of June.

Alongeside the lecture there will be a mandatory lab with weekly in-person sessions and homework group assignments. The preliminary appointment will be Tuesday 8:15-9:45 am, but this is open to change if too many students have conflicting appointments.

Course Content
- Introduction to information security
- Security assessment
    - Introduction to security assessment
    - Reconnaissance
    - Scanning
    - Exploitation
    - Post-exploitation
- Security operations
    - Intrusion prevention and detection
    - Incident response
    - Standards, regulations and security policies
- Emerging topics

Lab topics:
- Host discovery and service scanning
- Password & Hash bruteforcing
- Binary reverse engineering and exploitation
- SQL injection & command injection
- Privilege escalation techniques
- Pivoting
- Network traffic capturing and inspection
- Forensics and Steganography
- Firewall and intrusion detection system configuration

Competencies / Learning Results
  - Memorize and define common IT (Information Technology) security taxonomies for threat intelligence, vulnerability assessment and security operations.
  - Describe the standard methodologies for the phases reconnaissance, scanning, exploitation and post-exploitation of a security assessment.
  - Describe the standard methodologies for authentication, intrusion detection, intrusion prevention, incident response and physical security in the context of security operations.
  - Develop and justify information security policies with knowledge of regulatory compliance and industry standards.
  - Identify security problems in emerging topics of the IT and OT (Operational Technology) fields.
  - Choose and use common scanning tools to discover potentially vulnerable services on a given target host.
  - Compose and apply vulnerability exploitation techniques and gain privileged access to show a host is vulnerable.
  - Analyze and reconstruct information in storage media and log files using common forensic tools
  - Summarize significant findings and write about necessary technical details to reproduce these findings

Lecturers:
Daniel Reti, M.Sc.
Fraunholz, Daniel, Dr.-Ing.

Information Security Assessment and Operations

SS2021 Organization:


Please Register to the course on KIS: https://office.kis.uni-kl.de/views/campus/registration.asp?object=event&gguid=0xDCEB759D6EE14371BAA176BBA47162E7 (Deadline April 16th)
We will send the OLAT course code to all registered students by April 19.
The first lecture will find place on April 22.

In the OLAT course you can find the lecture slides, prepared videos as a substitution for the lecture, exercises and further organizatorial information.

For organizatorial questions please contact Dr. Daniel Fraunholz.



------

Course Content
   - Introduction to information security
   - Security assessment
     o Introduction to security assessment
     o Reconnaissance
     o Scanning
     o Exploitation
     o Post-exploitation
   - Security operations
     o Intrusion prevention and detection
     o Incident response
     o Standards, regulations and security policies
   - Emerging topics e.g. Industrial security, cloud security, mobile/IoT security and WiFi auditing

Competencies / Learning Results
  - Memorize and define common IT (Information Technology) security taxonomies for threat intelligence, vulnerability assessment and security operations.
  - Describe the standard methodologies for the phases reconnaissance, scanning, exploitation and post-exploitation of a security assessment.
  - Describe the standard methodologies for authentication, intrusion detection, intrusion prevention, incident response and physical security in the context of security operations.
  - Develop and justify information security policies with knowledge of regulatory compliance and industry standards.
  - Identify security problems in emerging topics of the IT and OT (Operational Technology) fields.
  - Choose and use common scanning tools to discover potentially vulnerable services on a given target host.
  - Compose and apply vulnerability exploitation techniques and gain privileged access to show a host is vulnerable.
  - Analyze and reconstruct information in storage media and log files using common forensic tools
  - Summarize significant findings and write about necessary technical details to reproduce these findings

Lecturers:
Daniel Reti, M.Sc.
Duque Antón, Simon, Dipl.-Ing.
Fraunholz, Daniel, Dr.-Ing.
Schotten, Hans D., Prof. Dr.-Ing.