Organizational Details Summer 2015



Similar documents
Advanced Internet Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

UVic Department of Electrical and Computer Engineering

Certified Cyber Security Analyst VS-1160

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.

CS 450/650 Fundamentals of Integrated Computer Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Course Design Document. IS403: Advanced Information Security and Trust

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Advanced Systems Security

Network Security ITP 457 (4 Units)

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

CS Ethical Hacking Spring 2016

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Introduction to Programming

CS 464/564 Networked Systems Security SYLLABUS

YAŞAR UNIVERSITY GRADUATE SCHOOL OF SOCIAL SCIENCES GENERAL GUIDELINE FOR MASTER STUDENTS

MW , TU 1-3; and other times by appointment

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CIS 4204 Ethical Hacking Fall, 2014

e-code Academy Information Security Diploma Training Discerption

Computer Security (EDA263 / DIT 641)

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Course Title: Course Description: Course Key Objective: Fee & Duration:

Certified Ethical Hacker (CEH)

PSY 2012 General Psychology Syllabus

Master of Science in Information Systems & Security Management. Courses Descriptions

Advanced Digital Forensics ITP 475 (4 Units)

Computer Forensics introduction part A

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

INSTRUCTOR: Dwight Makaroff - Thorvaldson x8656. Available via appointment.

Security and Computer Forensics ITP 477 (4 Units)

Introduction to Computer Forensics Course Syllabus Spring 2012

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

LINUX / INFORMATION SECURITY

[CEH]: Ethical Hacking and Countermeasures

CEH Version8 Course Outline

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)

EECS 354 Network Security. Introduction

Computer Security SEGC-00 - Overview

Introduction to Information Technology ITP 101x (4 Units)

Modern Binary Exploitation Course Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

SONDRA SCHNEIDER JOHN NUNES

TCOM 562 Network Security Fundamentals

EC-Council Ethical Hacking and Countermeasures

FORBIDDEN - Ethical Hacking Workshop Duration

CSC 474 Information Systems Security

TEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc.

Management 3050 Y Human Resource Management

Software Systems Engineering

Penetration Testing with Kali Linux

CSC 314: Operating Systems Spring 2005

UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF Theory of Finance SYLLABUS Spring 2013

Department of Bioinformatics and Computational Biology College of Science Student Handbook

POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE

CS479/579 Special Topics: Social Computing Syllabus. Computer Science Department, New Mexico State University 01/20/ /13/2016

BUSA 501: Introduction to Business Analytics

Computer Security (EDA263 / DIT 641)

Tele3119 Trusted Networks Course Outline 2013

ISM and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015

Certified Cyber Security Analyst VS-1160

MIS W: Mobile Business

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Computer and Network Security

ECE 156A - Syllabus. Lecture 0 ECE 156A 1

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

How To Prepare And Manage A Project

DEPARTMENT OF INFORMATION SCIENCE. INFO221 Application Software Development COURSE OUTLINE

(Short) Overview + Information for Master Computer Science Four main research areas of Uni Bonn/Computer Science

Earth System Science. Curriculum. Master of Science

Advanced ANDROID & ios Hands-on Exploitation

June 2014 WMLUG Meeting Kali Linux

CIS 213 PENETRATION TESTING 3 cr. (2-2)

Syracuse University School of Information Studies. IST553 - Information Architecture for Internet Services. Tentative Syllabus - Spring 2015

Transcription:

Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research

Cooperation for all security classes 183/1-ISecLab and 188/1 and SBA Research now jointly teach all classes.

Overview SUMMER Introduction to Security Seminar aus Security Software Security Internet Security Digital Forensics cancelled (contact: MMulazzani@sba-research.org) Winter Organizational Aspects of IT-Security Advanced Internet Security Privacy Enhancing Technologies

188.916 INTRODUCTION TO SECURITY

Overview TUWEL as central point of information Forum; email only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl (edgar.weippl@tuwien.ac.at) Daniela Friedl (dfriedl@sba-research.org) Course syllabus & Assignments: Dimitris Simos (dimitrios.simos@tuwien.ac.at) Georg Merzdovnik (GMerzdovnik@sba-research.org) TAs: Kristoffer Kleine, Philipp Kafka, Wilfrid Mayer Lectures Lectures are condensed from the book attendance optional

Grading Grading 4 Assignments Submission via TUWEL Deadlines in TUWEL One-time-pad SQL-injection Cracking passwords Breaking WEP/WPA Exams (2 parts) Midterm Exam Final Exam Retake Exam: possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS! Room assignment for exams will be announced before exams

Details Dates Blocks & Book Chapters Lecturers March 12 Cryptography Block #1: 1, 2, 20 Dimitris Simos March 26 Cryptography Block #2: 21 Dimitris Simos April 16 Software Security Block: 5, 11, 12 Aljosha Judmayer April 23 Usable Security Block: 3, 17 Katharina Krombholz April 30 MIDTERM EXAM (4 p.m.) April 30 Malware Block: 6, 10 Georg Merzdovnik May 7 Network Security Block #1: 7, 8, 9 Johanna Ullrich May 21 Network Security Block #2: 22, 23, 24 Johanna Ullrich May 28 Management Issues of IT Security Block: 14,15,18,19 June 10 FINAL EXAM (2 p.m.) June 24 RETAKE EXAM (4 p.m.) Edgar Weippl

Required Literature Computer Security: Principles and Practice William Stallings, Lawrence Brown 3rd Edition Chapters: Midterm Exam : 1, 2, 3, 5, 11, 12, 17, 20, 21 Final Exam: 6, 7, 8, 9, 10, 14, 15, 18, 19, 22, 23, 24

Grading Scheme Total 100 50pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) 92-100pt 1 (Sehr gut)

188.972 SEMINAR AUS SECURITY

Overview TUWEL as central point of information Forum for questions Edgar Weippl (edgar.weippl@tuwien.ac.at) Georg Merzdovnik (georg.merzdovnik@tuwien.ac.at) Content: State-of-the-art security research Writing paper reviews, mini survey & presentation conference-style

Grading Grading 1 Survey paper of security relevant topics Group work of 2 2 Reviews of other students survey papers Final presentation Lectures Introduction lecture 10.03.2015,1pm, Seminarraum Gödel Two appointments for final presentation of surveys: 14:00-17:00 03.06.2015 EI 9 Hlawka HS 14:00-17:00 05.06.2015 EI 5 Hochenegg HS Attendance mandatory!

188.959 SOFTWARE SECURITY

Overview TUWEL as central point of information Forum; email only for personal questions Organizational issues (STEOP, registration,..): Edgar Weippl (edgar.weippl@tuwien.ac.at) Daniela Friedl (dfriedl@sba-research.org) Course syllabus & Assignments: Dimitris Simos (dimitrios.simos@tuwien.ac.at) Georg Merzdovnik (GMerzdovnik@sba-research.org) Lecturers: Severin Winkler, Dimitris Simos, Sebastian Schrittwieser, Georg Merzdovnik, Manuel Leithner Tutor: Rene Czerny

Details Dates Lecture Blocks Lecturers March 13 OWASP Advanced Topics Severin Winkler April 13 Software Obfuscation Sebastian Schrittwieser April 17 Reverse Engineering Georg Merzdovnik April 24 MIDTERM EXAM (12 p.m.) May 8 Web Security Testing Dimitris Simos May 22 Language Security Manuel Leithner May 29 Java 8 Security & Secure Coding Severin Winkler June 11 Protocol Interaction Testing Dimitris Simos June 19 FINAL EXAM (13 p.m.)... June 26 RETAKE EXAM (12 p.m.) Exam Registration in TISS!

Grading Grading 3 Assignments Webapp Security Software Obfuscation (Reversing Basics - A Practical Approach Using IDA Pro) SSHd backdoor Exams (2 parts) Midterm Exam (24.4) Final Exam (19.6.) Retake Exam (26.6.): possibility to retake either midterm or final exam. Last result counts! Exam Registration in TISS!

Optional Literature Software Security: Building Security In Gary McGraw Midterm exam: OWASP advanced topics, software obfuscation, reverse engineering Final exam: web security testing, java 8 security & secure coding, language security, protocol interaction testing

Grading Scheme Total 100 50pt Assignment (min 25 to pass) 50pt Written exam (25 pt each; min of 12.5 each to pass) 50-64pt 4 (Genügend) 65-79pt 3 (Befriedigend) 80-91pt 2 (Gut) 92-100pt 1 (Sehr gut)

188.366 Internet Security

Internet Security: Overview In cooperation with iseclab (e183) People: Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler; Tutor: Eduard Thamm, Willfried Mayer Lecture: FH HS6, Thursday 12-14 Exam: June 25 th Final Grade: 50% Exam + 50% Lab Lab-Exercises: 5 Lab Challenges + 1 Bonus (5*20%+10% Bonus=110%) One challenge every apx 2 weeks No points for partially solved challenges! Need at least ½ of challenges & 50% on the exam to pass All details here: https://secenv.seclab.tuwien.ac.at/

Challenges (tentative list) Internet Security Network security tools (e.g., nmap, tcpdump) Web security (SQL injection, XSS ) Security-related programming assignment (java?) Cryptography Stack-based buffer overflow (advanced in comparison to other challenges)

Internet Security Lab Environment assignments should be mostly solved at home / any computer with Internet connection small hacking network, which is remotely accessible via ssh (Linux) Accounts are created automagically (registration until 2015-03-18) Email registered in TISS is used for correspondence Submission hard deadlines (with sufficient time) automated checks with immediate feedback Questions: USE TISS FORUM email: inetsec@seclab.tuwien.ac.at

InetSec 1 and InetSec 2 Internet Security InetSec 1 InetSec 2 Unix Security Windows Security Buffer Overflows Internet Application Security Cryptography Race Conditions ( ) Reverse Engineering Viruses and Worms Web Security Hardware Security

Your Roadmap to Enlightenment Requirement Rating InetSec 1, candidate InetSec 1, pass InetSec 2, 4 solved challenges InetSec 2, 5 solved challenges InetSec 2, 6 solved challenges InetSec 2, 6 solved challenges, CTF Nobody Apprentice Stackmaster expl0it Warlock Guru Master Guru

Who should do InetSec 2 Internet Security People who would like to become security gurus. We take part in a Capture the Flag hacking contest against other universities lots of fun. (1st place in 2011 and 2007, 2nd place in 2005, 2009, 2012, Defcon Finals in 2012). People who are hard-core technical (i.e., C and Linux should not be a problem for you) You should be interested in solving technical problems People who have time You get the chance to solve security challenges such as writing a virus, reverse engineering applications

Who should do InetSec 2 Internet Security Internet Security 2 (aka Advanced InetSec)

General information

Information Security Additionally we can offer: Praktikum (PR) Bachelor thesis Master thesis PhD thesis Research assistant Industrial projects Website: https://www.sba-research.org/teaching/

COMET Research Center for Information Security SBA Research Area 1 (GRC): Governance, Risk and Compliance Area 2 (DSP): Data Security and Privacy Area 3 (SCA): Secure Coding and Code Analysis Area 4 (HNS): Hardware and Network Security P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet

International Cooperation