Hasso-Plattner-Institut Design IT. Create Knowledge.

News

27.10.2014

openHPI Course "Internet Security" (German)

Prof. Dr. Christoph Meinel's new openHPI course about "Internet Security" starts on October 27, 2014. The course is held ... [more]
02.08.2014

HTML5 Player

Our new HTML5-based video player is now online. You can find it in the right column of the "play buttons ... [more]
31.03.2014

openHPI Course "Internetworking"

A new openHPI course about "Internetworking" starts on March 31, 2014. The course is held by Prof. Dr. Christoph Meinel ... [more]

Statistics

userclicks 33 M
lecture 5473
activelecturer 2001
series 443
Lecture-Feed of Series: Internet Security - Weaknesses and Targets, CS-School BJUT (WS 2011/12) Feed of Series: Internet Security - Weaknesses and Targets, CS-School BJUT (WS 2011/12)

Internet Security - Weaknesses and Targets, CS-School BJUT (WS 2011/12)

Image of
Not enough ratings.

Prof. Dr. Christoph Meinel

Predecessor of this series: Internet Security - Weaknesses and Targets, CS-School BJUT (WS 2010/11)

"Internet Security - Weaknesses and Targets" gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Besides, more introductions are provided on: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture concludes with the discussion on possibilities to detect attacks and intrusions and ethical issuses are introduced as well.

Outline

Introduction

Not enough ratings.
Date: 16.10.2011
Lang.: en
Dur.: 01:25:34
Play full lecture
• Nowaday's Internet 00:18:29
• Internet is an easy Target 00:17:51
• Evolution of Internet Security 00:18:05
• Most Common Attacks 00:13:47
• Basic Risks by Using the Internet 00:11:42
• Course Content 00:05:40
Not enough ratings.
Date: 16.10.2011
Lang.: en
Dur.: 01:26:28
Play full lecture
• Introduction 00:11:50
• Classification of Computer Networks 00:11:31
• Internets and Internet Protocols 00:20:06
• TCP/IP Protocol Stack 00:14:04
• WWW - World Wide Web 00:12:40
• WWW-Browser and WWW-Server 00:12:28
• Internet Standards 00:03:49

Risk Analysis and Computer Crime

Not enough ratings.
Date: 23.10.2011
Lang.: en
Dur.: 01:12:22
Play full lecture
• Introduction 00:15:05
• Risk Definition 00:13:22
• Evaluation of Risks 00:25:21
• Basic Risks of Internet 00:18:34
Not enough ratings.
Date: 23.10.2011
Lang.: en
Dur.: 00:22:18
Play full lecture
• Introduction 00:00:39
• Potential Attackers 00:14:18
• Professional Hackers 00:07:21
Not enough ratings.
Date: 23.10.2011
Lang.: en
Dur.: 00:52:51
Play full lecture
• First Generation of Hackers 00:10:48
• Viruses, Worms, Trojan Horses 00:11:26
• Short History of Cyber Crime 00:12:29
• Cyber Crime in this century 00:14:52
• Financial Losses by Cyber Crime 00:03:16

Weaknesses and Targets

Not enough ratings.
Date: 30.10.2011
Lang.: en
Dur.: 00:42:06
Play full lecture
• Technical Failures 00:08:32
• Defective Designs 00:06:55
• Lack of Knowledge and Carelessness 00:07:13
• Social Hacking 00:11:25
• Most Typical Break-in Methods 00:08:01
Not enough ratings.
Date: 30.10.2011
Lang.: en
Dur.: 00:37:31
Play full lecture
• Introduction 00:06:22
• Passive Recon 00:12:33
• Web Recon 00:13:20
• Active Recon 00:05:16
Not enough ratings.
Date: 30.10.2011
Lang.: en
Dur.: 00:32:38
Play full lecture
• Introduction 00:03:08
• Telnet Session Negotiation 00:05:44
• TCP Stack Fingerprinting 00:10:22
• Passive Fingerprinting 00:04:25
• Fuzzy OS Fingerprinting 00:08:59
Not enough ratings.
Date: 30.10.2011
Lang.: en
Dur.: 00:56:29
Play full lecture
• Introduction 00:05:04
• Guessing 00:07:43
• Cracking 00:12:53
• Cracking with Rainbow Tables 00:16:42
• Sniffing 00:08:46
• Protection against Password Theft 00:05:21
Not enough ratings.
Date: 06.11.2011
Lang.: en
Dur.: 01:33:54
Play full lecture
• Introduction 00:15:24
• IP Address Spoofing 00:07:18
• ICMP-Attacks 00:26:20
• Internet-Routing-Attacks 00:13:52
• ARP Attacks 00:15:44
• IP Fragmentation Attacks 00:09:25
• IP Bombing 00:05:51
Not enough ratings.
Date: 06.11.2011
Lang.: en
Dur.: 01:35:59
Play full lecture
• Introduction 00:10:26
• Attack Scenarios 00:12:39
• TCP-Sequence-Number Attack 00:25:10
• UDP Attacks 00:17:14
• DNS-Attacks 00:19:13
• Attacks on VoIP 00:10:57
Not enough ratings.
Date: 13.11.2011
Lang.: en
Dur.: 00:30:00
Play full lecture
• Buffer Overflow 00:15:47
• Defective Syntax Check 00:07:05
• Race Conditions 00:07:08
Not enough ratings.
Date: 13.11.2011
Lang.: en
Dur.: 01:21:58
Play full lecture
• Security Architecture of Unix 00:11:17
• Attacks at Boot-Time 00:08:06
• SUID Abuse 00:09:07
• Network and Application Attacks in Unix 00:22:04
• DNS / BIND Vulnerabiliies 00:07:21
• Strategies to protect Unix-Systems 00:24:03
Not enough ratings.
Date: 20.11.2011
Lang.: en
Dur.: 01:15:58
Play full lecture
• Introduction 00:08:05
• SMB Relay Attack 00:09:49
• UPnP Attacks 00:09:50
• Remote Desktop Attacks 00:10:16
• Kerberos Authentication Attacks 00:23:01
• Defeating Buffer Overflow Prevention 00:05:30
• Weaknesses of Mac OS X 00:09:27
Not enough ratings.
Date: 20.11.2011
Lang.: en
Dur.: 01:07:59
Play full lecture
• Introduction 00:08:25
• Spying Out Personal Data 00:15:51
• Java 00:21:19
• JavaScript 00:16:47
• Protective Measures for Web-Browsers 00:05:37
Not enough ratings.
Date: 27.11.2011
Lang.: en
Dur.: 01:08:06
Play full lecture
• Introduction 00:06:01
• Break into Web-Servers 00:23:13
• Cross-Site-Scripting 00:18:09
• Current Challenges in SOA-Security 00:08:50
• WS-Security 00:11:53
Not enough ratings.
Date: 27.11.2011
Lang.: en
Dur.: 01:26:35
Play full lecture
• Introduction 00:03:59
• IEEE 802.11 Wireless Lan 00:21:15
• WLAN Security Weaknesses 00:12:44
• WLAN Security with IEEE 802.1x 00:09:29
• WLAN Security with WPA 00:12:33
• WLAN Security in Practice 00:07:28
• Cellular Phone Technologies 00:19:07

Detection of Attacks and Intrusions

Not enough ratings.
Date: 04.12.2011
Lang.: en
Dur.: 01:23:28
Play full lecture
• Introduction 00:11:18
• Anomalies and Attack Signatures 00:14:42
• Attack Signatures 00:08:41
• Anti-Virus Software 00:14:29
• Implementation of IDS 00:13:10
• Alert Correlation 00:21:08

Legal and Ethical Issues

Not enough ratings.
Date: 04.12.2011
Lang.: en
Dur.: 01:19:54
Play full lecture
• Introduction 00:06:06
• Legal Systems 00:08:10
• Example German Criminal Law 00:13:06
• Case Studies 00:17:12
• Responsibillity of IT-Managers 00:23:05
• Code of Ethics 00:12:15
Tags added to this content

No tags have been added to this content so far.

Tag this content

Please enable javascript to use this function.

Dear user,
with the tagging function you'll be able to add taggs to videos.
However, in order to link all your tags with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.
Links added to this content

No links have been added to this content so far.

Add Link to this content

Please enable javascript to use this function.

Dear user,
with the links function you'll be able to add links to other resources to this content.
However, in order to link all your links with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.