Information Security Assessment and Operations

Lecture Announcement 2024

For 2024, we are changing the mode of our Security A&O lecture a little bit, as we are switching from videos and online lectures to in-person block lectures. Here we are going to have two lecture blocks of two whole days each. The first blocks will be on 29.-30. of April and the second blocks will be on 3.-4. of June.

Alongeside the lecture there will be a mandatory lab with weekly in-person sessions and homework group assignments. The preliminary appointment will be Tuesday 8:15-9:45 am, but this is open to change if too many students have conflicting appointments.

Course Content
- Introduction to information security
- Security assessment
    - Introduction to security assessment
    - Reconnaissance
    - Scanning
    - Exploitation
    - Post-exploitation
- Security operations
    - Intrusion prevention and detection
    - Incident response
    - Standards, regulations and security policies
- Emerging topics

Lab topics:
- Host discovery and service scanning
- Password & Hash bruteforcing
- Binary reverse engineering and exploitation
- SQL injection & command injection
- Privilege escalation techniques
- Pivoting
- Network traffic capturing and inspection
- Forensics and Steganography
- Firewall and intrusion detection system configuration

Competencies / Learning Results
  - Memorize and define common IT (Information Technology) security taxonomies for threat intelligence, vulnerability assessment and security operations.
  - Describe the standard methodologies for the phases reconnaissance, scanning, exploitation and post-exploitation of a security assessment.
  - Describe the standard methodologies for authentication, intrusion detection, intrusion prevention, incident response and physical security in the context of security operations.
  - Develop and justify information security policies with knowledge of regulatory compliance and industry standards.
  - Identify security problems in emerging topics of the IT and OT (Operational Technology) fields.
  - Choose and use common scanning tools to discover potentially vulnerable services on a given target host.
  - Compose and apply vulnerability exploitation techniques and gain privileged access to show a host is vulnerable.
  - Analyze and reconstruct information in storage media and log files using common forensic tools
  - Summarize significant findings and write about necessary technical details to reproduce these findings

Daniel Reti, M.Sc.
Fraunholz, Daniel, Dr.-Ing.