Introduction and Table of Content | 00:15:20 | |
---|---|---|
Content of the Lecture Course | 00:03:41 | |
Table of Contents | 00:04:26 | |
Preconditions for attending the course | 00:04:40 | |
Evaluation Criteria | 00:02:34 |
Internet Security - An Overview | 01:16:54 | |
---|---|---|
A First Example: Staatstrojaner | 00:17:09 | |
Nowaday's Internet | 00:26:03 | |
Changing Nature of Threats | 00:22:10 | |
Most Common Attacks | 00:04:14 | |
General Risks of Interconnected Systems | 00:03:22 | |
Internet Security - Weaknesses and Targets: Course Content | 00:03:56 |
First Understanding of Internet and WWW | 01:27:34 | |
---|---|---|
Introduction | 00:09:42 | |
Classification of Computer Networks | 00:10:33 | |
Internet and Internet Protocols | 00:19:31 | |
TCP/IP Protocol Stack | 00:16:14 | |
WWW - World Wide Web | 00:11:52 | |
WWW-Browser and WWW-Server | 00:19:35 |
Risk Analysis | 01:03:37 | |
---|---|---|
Introduction | 00:06:36 | |
Risks in Internetworking IT-Systems | 00:13:10 | |
Risk Definition | 00:01:55 | |
Risk Analysis | 00:07:19 | |
Evaluation of Risk | 00:20:39 | |
Basic Risks of the Internet | 00:13:58 |
Cybercrime: Potential Attackers | 00:21:41 | |
---|---|---|
Potential Attackers | 00:21:41 |
Hackers and Viruses | 01:08:48 | |
---|---|---|
First Generation of Hackers | 00:12:13 | |
Viruses, Worms, Trojan Horses | 00:11:39 | |
Well-known security Incidents in History | 00:39:48 | |
Financiel Losses by Cyber Crime | 00:05:08 |
Human Factor and Technical Failures | 00:42:44 | |
---|---|---|
Technical Failures | 00:13:18 | |
Defective Design | 00:11:24 | |
Social Hacking | 00:10:28 | |
Most Typical Break-in Methods | 00:07:34 |
Reconnaissance | 00:23:16 | |
---|---|---|
Introduction | 00:16:13 | |
Web Recon | 00:07:03 |
OS Fingerprinting | 00:26:05 | |
---|---|---|
Introduction | 00:07:09 | |
TCP Stack Fingerprinting | 00:11:27 | |
Passive Fingerprinting | 00:07:29 |
Attacks on Accounts and Passwords | 00:58:18 | |
---|---|---|
Introduction | 00:08:00 | |
Password Guessing | 00:11:52 | |
Password Cracking | 00:19:14 | |
Password Sniffing | 00:03:47 | |
Phishing - Password Fishing | 00:10:55 | |
Protection Against Password Theft | 00:04:30 |
Weaknesses of Internet Protocols (1) | 01:19:04 | |
---|---|---|
Introduction | 00:14:29 | |
ARP-Attacks | 00:14:12 | |
IP Adress Spoofing | 00:05:56 | |
ICMP-Attacks | 00:17:21 | |
Internet-Routing-Attacks | 00:10:09 | |
FTP-Attacks | 00:09:43 |
Weaknesses of Internet Protocols (2) | 01:23:31 | |
---|---|---|
Introduction | 00:12:54 | |
TCP Attacks | 00:28:24 | |
Attacks on TLS/SSL | 00:14:00 | |
DNS-Attacks | 00:07:07 | |
SMTP-Attacks | 00:06:56 | |
FTP-Attacks | 00:14:10 |
Design and Programming Errors | 00:27:50 | |
---|---|---|
Introduction | 00:02:14 | |
Buffer Overflow | 00:14:53 | |
Insufficient Input Validation | 00:05:09 | |
Race Conditions | 00:05:34 |
Weaknesses of Unix/Linux - Attacks and Exploits | 01:07:54 | |
---|---|---|
Introduction | 00:11:23 | |
Password Attacks in Unix | 00:13:00 | |
Network and Application Attacks | 00:17:01 | |
DNS/ BIND Vulnerabilities | 00:05:13 | |
Strategies to Protect Unix-Systems | 00:21:17 |
Weaknesses of MS Windows and Mac OS X | 01:10:40 | |
---|---|---|
Introduction | 00:18:17 | |
UPnP Attack | 00:08:25 | |
Remote Deskto Attack | 00:08:33 | |
Kerberos Authentification | 00:12:15 | |
Weaknesses in Mac OS X | 00:23:10 |
Weaknesses of the World Wide Web (1) | 01:02:32 | |
---|---|---|
Introduction | 00:11:43 | |
Spying Out Personal Data | 00:10:57 | |
Java | 00:15:49 | |
JavaScript | 00:10:25 | |
ActiveX | 00:13:38 |
Weaknesses of the World Wide Web (2) | 01:03:22 | |
---|---|---|
Introduction | 00:10:30 | |
URL-Attacks | 00:17:16 | |
Cross-Site Scripting | 00:14:35 | |
Challenges of Web Services | 00:21:01 |
Wireless Security | 01:24:20 | |
---|---|---|
Introduction | 00:16:28 | |
WLAN Parameters | 00:18:47 | |
WLAN Security with IEEE 802.1x | 00:26:43 | |
Wi-Fi Security in Practice | 00:20:31 | |
Summary | 00:01:51 |
Detection of Attacks and Intrusions | 01:23:57 | |
---|---|---|
Introduction | 00:09:11 | |
Anomalies and Attack Signatures | 00:21:43 | |
Host-based IDS | 00:11:14 | |
Intrusion Response | 00:16:24 | |
Existing Solutions | 00:25:25 |
Law and Ethics | 00:54:04 | |
---|---|---|
Introduction | 00:04:09 | |
Legal Systems | 00:17:27 | |
Case Studies | 00:11:27 | |
Ethical Issues | 00:08:41 | |
Code of Ethics | 00:12:20 |