Information Security Assessment and Operations
Lecture Announcement 2024
For 2024, we are changing the mode of our Security A&O lecture a little bit, as we are switching from videos and online lectures to in-person block lectures. Here we are going to have two lecture blocks of two whole days each. The first blocks will be on 29.-30. of April and the second blocks will be on 3.-4. of June.
Alongeside the lecture there will be a mandatory lab with weekly in-person sessions and homework group assignments. The preliminary appointment will be Tuesday 8:15-9:45 am, but this is open to change if too many students have conflicting appointments.
Course Content
- Introduction to information security
- Security assessment
- Introduction to security assessment
- Reconnaissance
- Scanning
- Exploitation
- Post-exploitation
- Security operations
- Intrusion prevention and detection
- Incident response
- Standards, regulations and security policies
- Emerging topics
Lab topics:
- Host discovery and service scanning
- Password & Hash bruteforcing
- Binary reverse engineering and exploitation
- SQL injection & command injection
- Privilege escalation techniques
- Pivoting
- Network traffic capturing and inspection
- Forensics and Steganography
- Firewall and intrusion detection system configuration
Competencies / Learning Results
- Memorize and define common IT (Information Technology) security taxonomies for threat intelligence, vulnerability assessment and security operations.
- Describe the standard methodologies for the phases reconnaissance, scanning, exploitation and post-exploitation of a security assessment.
- Describe the standard methodologies for authentication, intrusion detection, intrusion prevention, incident response and physical security in the context of security operations.
- Develop and justify information security policies with knowledge of regulatory compliance and industry standards.
- Identify security problems in emerging topics of the IT and OT (Operational Technology) fields.
- Choose and use common scanning tools to discover potentially vulnerable services on a given target host.
- Compose and apply vulnerability exploitation techniques and gain privileged access to show a host is vulnerable.
- Analyze and reconstruct information in storage media and log files using common forensic tools
- Summarize significant findings and write about necessary technical details to reproduce these findings