| Introduction and Table of Content | 00:15:20 | |
|---|---|---|
| Content of the Lecture Course | 00:03:41 | |
| Table of Contents | 00:04:26 | |
| Preconditions for attending the course | 00:04:40 | |
| Evaluation Criteria | 00:02:34 |
| Internet Security - An Overview | 01:16:54 | |
|---|---|---|
| A First Example: Staatstrojaner | 00:17:09 | |
| Nowaday's Internet | 00:26:03 | |
| Changing Nature of Threats | 00:22:10 | |
| Most Common Attacks | 00:04:14 | |
| General Risks of Interconnected Systems | 00:03:22 | |
| Internet Security - Weaknesses and Targets: Course Content | 00:03:56 |
| First Understanding of Internet and WWW | 01:27:34 | |
|---|---|---|
| Introduction | 00:09:42 | |
| Classification of Computer Networks | 00:10:33 | |
| Internet and Internet Protocols | 00:19:31 | |
| TCP/IP Protocol Stack | 00:16:14 | |
| WWW - World Wide Web | 00:11:52 | |
| WWW-Browser and WWW-Server | 00:19:35 |
| Risk Analysis | 01:03:37 | |
|---|---|---|
| Introduction | 00:06:36 | |
| Risks in Internetworking IT-Systems | 00:13:10 | |
| Risk Definition | 00:01:55 | |
| Risk Analysis | 00:07:19 | |
| Evaluation of Risk | 00:20:39 | |
| Basic Risks of the Internet | 00:13:58 |
| Cybercrime: Potential Attackers | 00:21:41 | |
|---|---|---|
| Potential Attackers | 00:21:41 |
| Hackers and Viruses | 01:08:48 | |
|---|---|---|
| First Generation of Hackers | 00:12:13 | |
| Viruses, Worms, Trojan Horses | 00:11:39 | |
| Well-known security Incidents in History | 00:39:48 | |
| Financiel Losses by Cyber Crime | 00:05:08 |
| Human Factor and Technical Failures | 00:42:44 | |
|---|---|---|
| Technical Failures | 00:13:18 | |
| Defective Design | 00:11:24 | |
| Social Hacking | 00:10:28 | |
| Most Typical Break-in Methods | 00:07:34 |
| Reconnaissance | 00:23:16 | |
|---|---|---|
| Introduction | 00:16:13 | |
| Web Recon | 00:07:03 |
| OS Fingerprinting | 00:26:05 | |
|---|---|---|
| Introduction | 00:07:09 | |
| TCP Stack Fingerprinting | 00:11:27 | |
| Passive Fingerprinting | 00:07:29 |
| Attacks on Accounts and Passwords | 00:58:18 | |
|---|---|---|
| Introduction | 00:08:00 | |
| Password Guessing | 00:11:52 | |
| Password Cracking | 00:19:14 | |
| Password Sniffing | 00:03:47 | |
| Phishing - Password Fishing | 00:10:55 | |
| Protection Against Password Theft | 00:04:30 |
| Weaknesses of Internet Protocols (1) | 01:19:04 | |
|---|---|---|
| Introduction | 00:14:29 | |
| ARP-Attacks | 00:14:12 | |
| IP Adress Spoofing | 00:05:56 | |
| ICMP-Attacks | 00:17:21 | |
| Internet-Routing-Attacks | 00:10:09 | |
| FTP-Attacks | 00:09:43 |
| Weaknesses of Internet Protocols (2) | 01:23:31 | |
|---|---|---|
| Introduction | 00:12:54 | |
| TCP Attacks | 00:28:24 | |
| Attacks on TLS/SSL | 00:14:00 | |
| DNS-Attacks | 00:07:07 | |
| SMTP-Attacks | 00:06:56 | |
| FTP-Attacks | 00:14:10 |
| Design and Programming Errors | 00:27:50 | |
|---|---|---|
| Introduction | 00:02:14 | |
| Buffer Overflow | 00:14:53 | |
| Insufficient Input Validation | 00:05:09 | |
| Race Conditions | 00:05:34 |
| Weaknesses of Unix/Linux - Attacks and Exploits | 01:07:54 | |
|---|---|---|
| Introduction | 00:11:23 | |
| Password Attacks in Unix | 00:13:00 | |
| Network and Application Attacks | 00:17:01 | |
| DNS/ BIND Vulnerabilities | 00:05:13 | |
| Strategies to Protect Unix-Systems | 00:21:17 |
| Weaknesses of MS Windows and Mac OS X | 01:10:40 | |
|---|---|---|
| Introduction | 00:18:17 | |
| UPnP Attack | 00:08:25 | |
| Remote Deskto Attack | 00:08:33 | |
| Kerberos Authentification | 00:12:15 | |
| Weaknesses in Mac OS X | 00:23:10 |
| Weaknesses of the World Wide Web (1) | 01:02:32 | |
|---|---|---|
| Introduction | 00:11:43 | |
| Spying Out Personal Data | 00:10:57 | |
| Java | 00:15:49 | |
| JavaScript | 00:10:25 | |
| ActiveX | 00:13:38 |
| Weaknesses of the World Wide Web (2) | 01:03:22 | |
|---|---|---|
| Introduction | 00:10:30 | |
| URL-Attacks | 00:17:16 | |
| Cross-Site Scripting | 00:14:35 | |
| Challenges of Web Services | 00:21:01 |
| Wireless Security | 01:24:20 | |
|---|---|---|
| Introduction | 00:16:28 | |
| WLAN Parameters | 00:18:47 | |
| WLAN Security with IEEE 802.1x | 00:26:43 | |
| Wi-Fi Security in Practice | 00:20:31 | |
| Summary | 00:01:51 |
| Detection of Attacks and Intrusions | 01:23:57 | |
|---|---|---|
| Introduction | 00:09:11 | |
| Anomalies and Attack Signatures | 00:21:43 | |
| Host-based IDS | 00:11:14 | |
| Intrusion Response | 00:16:24 | |
| Existing Solutions | 00:25:25 |
| Law and Ethics | 00:54:04 | |
|---|---|---|
| Introduction | 00:04:09 | |
| Legal Systems | 00:17:27 | |
| Case Studies | 00:11:27 | |
| Ethical Issues | 00:08:41 | |
| Code of Ethics | 00:12:20 |