inf420 - Introduction to IT-Security

inf420 - Introduction to IT-Security

Department of Computing Science 6 KP
Module components Semester courses Winter semester 2024/2025 Examination
Lecture
Exam
Exercises
Notes on the module
Module examination

Written or oral exam

The concretely chosen form of examination will be announced in the first week of the course.

Skills to be acquired in this module

Students understand the basic concepts, methods and protocols for protecting data and systems from manipulation and misuse on a basic, practice-oriented, scientific level (see "contents of the module"). The students can explain the causes of security problems in today's systems, can reproduce the connections between protection mechanisms and the problems they address, and can apply them to case studies. They can identify vulnerabilities, analyze them and understand the attack mechanisms described. In addition, the students are able to discuss possible solutions and are able to protect systems accordingly.

Professional competence
The students

  •  understand the semantics of security and explain the properties of secure IT systems (see "contents of the module"),
  • discuss the importance of IT security, and
  • carry out simple security analyses of systems.

Methological competence

The students

  • use concepts and techniques to increase security, in particular regarding which protection goals can be achieved with which techniques (see "contents of the module"),
  • apply mechanisms of IT security in simple scenarios, and
  • question the properties and limits of security concepts and combine different concepts in a meaningful way.

Social competence

The students

  • solve problems partially in small groups and thus improve their willingness to cooperate and their communication skills,
  • present solutions to IT security problems in front of the exercise group,
  • discuss their different solutions within the exercise group, and
  • improve their English language skills.

Self-competence
The students

  • motivate themselves to work on questions and problems in the domain of IT security,
  • justify their own actions with theoretical and methodical knowledge, and
  • critically reflect on proposed solutions in relation to social expectations and consequences, taking into account the methods taught.

Top