FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn. Competence Center for IT-Security Academic Staff manuel.koschuch@fh-campuswien.ac.at T: +43 1 606 68 77-2474 F: +43 1 606 68 77-2469 Room: B.3.15 Favoritenstraße 226 1100 WienLectures 2021/22Engineering> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman> Cryptographic Methods in IT ILV IT-Security moreCryptographic Methods in IT ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThe course gives a broad view across the possibilites of cryptographic methods in a typical workday, especially those of a SysAdmin. For alll topics, the theoretic background is presented alongside the practical usage implications. The covered topics are: * Hard disk encryption * Passwords * SSH & Network tunneling * E-mail security * Public Key InfrastructureAssessment methodsExercices and a final examTeaching methodsTheoretical lectures and individual tasks for all subjectsLanguageGerman> Network Defense Technologies ILV IT-Security moreNetwork Defense Technologies ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc2SWS4ECTSLecture contents- Overview of Threats - Firewalls (stateless/stateful) - Intrusion Detection and Prevention - IPsec-based VPNs - Overview over SSL and TLS and other VPN-Technologien (L2TP, PPTP, MPLS) - Advanced Persistent Thretas - Expert TalksAssessment methodsWritten final ExamTeaching methodsLecture with slides, whiteboard and external expert speeches Lab ExercisesLanguageGerman> Applied Cryptography ILV IT-Security moreApplied Cryptography ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis course covers the differences between the „textbook” and the “real-world” implementations of cryptographic algorithms. Symmetric techniques like DES and especially AES with its most important variations are dealt with in detail, as well as padding techniques and selected parts from the PKCS. These topics are supplemented with a basic introduction to the efficient implementation of long integer arithmetic.Assessment methodsWritten elaboration of selected lecture contents Presentation Written examinationTeaching methodsPresentation with slides and video projectorLanguageGerman> Cryptographic Protocols ILV IT-Security moreCryptographic Protocols ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis lecture gives an overview of many different cryptographic protocols, possible usage scenarios and their peculiarities. The students implement selected protocols from a given domain, compare them to each other and present the results. The main topics are - Public-Key Schemes - Key-Agreement/Key-Establishment - Challenge Response Schemes/Authentication - Signature SchemesAssessment methodsEvery presentation is a partial examination, there is no written final examTeaching methodsImplementations and presentations by the studentsLanguageGerman> Academic Research and Writing SE IT-Security moreAcademic Research and Writing SELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsAn important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.Assessment methodsThe evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.Teaching methodsDuring this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.LanguageGerman> Security Lab LB IT-Security moreSecurity Lab LBLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc4SWS10ECTSLecture contents- Practical application of IT-Security knowledge - Selected topics supplementing related courses - Protection of IT-Systems using Firewalls and Intrusion Prevention Systems - Design and Integration of a SIEM solutionAssessment methodsContinuous examination and documentationTeaching methods- Independent implementation of a project - Support is given at any time on request - Continuous progress reviewsLanguageGerman> Interdisciplinary Project UE IT-Security moreInterdisciplinary Project UELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Teissl, BSc MSc4SWS9ECTSLecture contentsSummary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples. Clarification of the differences between safety and security, and of the interfaces between these two areas. Diskussion and reflection of the insights from practical application of the above concepts.Assessment methodsAssessment of the submitted implementation and the presentations.Teaching methodsImplementing and presenting a practical example in small groups.LanguageGerman> Interdisciplinary Project UE Electronic Systems Engineering moreInterdisciplinary Project UELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Teissl, BSc MSc4SWS9ECTSLecture contentsSummary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples. Clarification of the differences between safety and security, and of the interfaces between these two areas. Diskussion and reflection of the insights from practical application of the above concepts.Assessment methodsAssessment of the submitted implementation and the presentations.Teaching methodsImplementing and presenting a practical example in small groups.LanguageGerman> Authoring of Scientific Papers SE Electronic Systems Engineering moreAuthoring of Scientific Papers SELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsAn important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.Assessment methodsThe evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.Teaching methodsDuring this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.LanguageGerman> Cloud Security and Identity Management ILV IT-Security moreCloud Security and Identity Management ILVLector: Tobias Buchberger, BSc MSc, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.3SWS4ECTSLecture contentsPractical Project Cloud Paradigms (IAAS, PAAS, SAAS) Security in the Cloud (Searchable/Homomorphic Encryption) Basics of Identity Management Single-Sign-On Systems, Shibboleth, Kerberos OAuth, OpenID Connect, SAML; FIDO, U2FAssessment methodswritten examTeaching methodsLecture Distance Education Practical work in small groupsLanguageGerman> Communication systems and data security ILV Health Assisting Engineering moreCommunication systems and data security ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Dipl.-Ing. Dr.techn. Michael Urbanek, BA BSc MSc, FH-Prof. Dipl.-Ing. Mag. Dr. techn. Franz Werner1.5SWS3ECTSLecture contents- Technical communications, communication methods, communication patterns - Basics of IT security and encryption - Basic functioning of the Internet, - Structure of packets, functions and services within the OSI layers (Ethernet, TCP, UDP) - Network components and devices - Network topologies - Overview of communication in the field of smart home and Internet of Things. Lab exercises on: - Network simulation, - network design and maintenance, - Networks in the Smart-Home area - IT security in networksAssessment methodsContinuous assessment Exercise hand-ins on an individual basis Lab protocols as hand in Final written examinationTeaching methodsLecture and interactive discussion Lab exercises Home exercisesLanguageGerman> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglish> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglishPublications The publications of Manuel Koschuch written at FH Campus Wien can be found in our publication database, others in the personal web space.
> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman
> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman
> Cryptographic Methods in IT ILV IT-Security moreCryptographic Methods in IT ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThe course gives a broad view across the possibilites of cryptographic methods in a typical workday, especially those of a SysAdmin. For alll topics, the theoretic background is presented alongside the practical usage implications. The covered topics are: * Hard disk encryption * Passwords * SSH & Network tunneling * E-mail security * Public Key InfrastructureAssessment methodsExercices and a final examTeaching methodsTheoretical lectures and individual tasks for all subjectsLanguageGerman
> Network Defense Technologies ILV IT-Security moreNetwork Defense Technologies ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc2SWS4ECTSLecture contents- Overview of Threats - Firewalls (stateless/stateful) - Intrusion Detection and Prevention - IPsec-based VPNs - Overview over SSL and TLS and other VPN-Technologien (L2TP, PPTP, MPLS) - Advanced Persistent Thretas - Expert TalksAssessment methodsWritten final ExamTeaching methodsLecture with slides, whiteboard and external expert speeches Lab ExercisesLanguageGerman
> Applied Cryptography ILV IT-Security moreApplied Cryptography ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis course covers the differences between the „textbook” and the “real-world” implementations of cryptographic algorithms. Symmetric techniques like DES and especially AES with its most important variations are dealt with in detail, as well as padding techniques and selected parts from the PKCS. These topics are supplemented with a basic introduction to the efficient implementation of long integer arithmetic.Assessment methodsWritten elaboration of selected lecture contents Presentation Written examinationTeaching methodsPresentation with slides and video projectorLanguageGerman
> Cryptographic Protocols ILV IT-Security moreCryptographic Protocols ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis lecture gives an overview of many different cryptographic protocols, possible usage scenarios and their peculiarities. The students implement selected protocols from a given domain, compare them to each other and present the results. The main topics are - Public-Key Schemes - Key-Agreement/Key-Establishment - Challenge Response Schemes/Authentication - Signature SchemesAssessment methodsEvery presentation is a partial examination, there is no written final examTeaching methodsImplementations and presentations by the studentsLanguageGerman
> Academic Research and Writing SE IT-Security moreAcademic Research and Writing SELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsAn important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.Assessment methodsThe evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.Teaching methodsDuring this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.LanguageGerman
> Security Lab LB IT-Security moreSecurity Lab LBLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc4SWS10ECTSLecture contents- Practical application of IT-Security knowledge - Selected topics supplementing related courses - Protection of IT-Systems using Firewalls and Intrusion Prevention Systems - Design and Integration of a SIEM solutionAssessment methodsContinuous examination and documentationTeaching methods- Independent implementation of a project - Support is given at any time on request - Continuous progress reviewsLanguageGerman
> Interdisciplinary Project UE IT-Security moreInterdisciplinary Project UELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Teissl, BSc MSc4SWS9ECTSLecture contentsSummary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples. Clarification of the differences between safety and security, and of the interfaces between these two areas. Diskussion and reflection of the insights from practical application of the above concepts.Assessment methodsAssessment of the submitted implementation and the presentations.Teaching methodsImplementing and presenting a practical example in small groups.LanguageGerman
> Interdisciplinary Project UE Electronic Systems Engineering moreInterdisciplinary Project UELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Teissl, BSc MSc4SWS9ECTSLecture contentsSummary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples. Clarification of the differences between safety and security, and of the interfaces between these two areas. Diskussion and reflection of the insights from practical application of the above concepts.Assessment methodsAssessment of the submitted implementation and the presentations.Teaching methodsImplementing and presenting a practical example in small groups.LanguageGerman
> Authoring of Scientific Papers SE Electronic Systems Engineering moreAuthoring of Scientific Papers SELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsAn important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.Assessment methodsThe evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.Teaching methodsDuring this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.LanguageGerman
> Cloud Security and Identity Management ILV IT-Security moreCloud Security and Identity Management ILVLector: Tobias Buchberger, BSc MSc, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.3SWS4ECTSLecture contentsPractical Project Cloud Paradigms (IAAS, PAAS, SAAS) Security in the Cloud (Searchable/Homomorphic Encryption) Basics of Identity Management Single-Sign-On Systems, Shibboleth, Kerberos OAuth, OpenID Connect, SAML; FIDO, U2FAssessment methodswritten examTeaching methodsLecture Distance Education Practical work in small groupsLanguageGerman
> Communication systems and data security ILV Health Assisting Engineering moreCommunication systems and data security ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Dipl.-Ing. Dr.techn. Michael Urbanek, BA BSc MSc, FH-Prof. Dipl.-Ing. Mag. Dr. techn. Franz Werner1.5SWS3ECTSLecture contents- Technical communications, communication methods, communication patterns - Basics of IT security and encryption - Basic functioning of the Internet, - Structure of packets, functions and services within the OSI layers (Ethernet, TCP, UDP) - Network components and devices - Network topologies - Overview of communication in the field of smart home and Internet of Things. Lab exercises on: - Network simulation, - network design and maintenance, - Networks in the Smart-Home area - IT security in networksAssessment methodsContinuous assessment Exercise hand-ins on an individual basis Lab protocols as hand in Final written examinationTeaching methodsLecture and interactive discussion Lab exercises Home exercisesLanguageGerman
> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish
> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglish
> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish
> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglish