The compulsory elective subjects enable students to set specialisations according to their own interests and thus apply further specialist areas of computer science or media informatics. The courses belonging to the module are announced on the intranet at the beginning of each semester.
The lecture teaches the construction of mobile media applications. The main concepts are discussed using the Android platform. In a first partt, the basic technologies and limitations of mobile devices are shown. The second part examins different development strategies like native applications, device independend abstractions and web applications. A main part of the lecture is the integration of different media types into mobile applications and the constraints the developer has to keep in mind.
will be announced
Leacture with exercise
The buzzword "Cloud" represents a variety of interesting technologies which gained importance in the life of a computer science professional. Those are being collected, examined, explained and understood during the course. Primary objective is usefulness for the student, regardless of whether he acts as a cloud user, developer, administrator or even entrepreneur. Understand the broad meaning of "Cloud Computing" from a variety of perspectives: Definition, use cases, technology basics, key players, APIs, scaling, redundancy …
Powerpoint slides
The focus of the event is the construction and operation of an IT security management system. This is done in accordance with the standards of the BSI and ISO.
Structure
Chapter 1: Basics and motivation
Chapter 2: Organizational basics of security management (“Institutionalization”)
Chapter 3: Structural analysis and modeling of IT network (“Inventory of relative objects”)
Chapter 4: Determination of protection requirements in the IT network (“Protection requirements of objects”)
Chapter 5: Construction of the IT basic protection model using the IT basic protection compendium (“Target security concept”)
Chapter 6: IT basic protection check (target-actual comparison, “Are there gaps?”)
Chapter 7: Risk analysis for objects with increased protection requirements
Chapter 8: Implementation planning (“Closing the gaps”)
Chapter 9: Maintenance and improvement (“ongoing operation”)
Lecture material completely as pdf documents, blackboard notes for interactive development of central problem positions, instructions for interactive role play and case study material
BSI-Standards 200-x
ISO-Reihe 27000
Thomas W. Harich: IT-Sicherheitsmanagement: Praxiswissen für IT Security Manager, mitp Professional
Participation lecture, development of an interactive role play in the group, individual execution of a short case study.
The students
Contents:
Basic knowledge of "ethical hacking" advantageous, initial experience with Assembler and/or Python, access to a Windows system.
Zhassulan Zhussupov. (2024). Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity (English Edition). <packt>