Studies in IT security

During my studies, I attended several modules with a focus on IT security. Below you will find a brief description of these modules.

Cryptography

In the cryptography module, we first covered cryptographic fundamentals and later looked at their practical application. The fundamentals included symmetric and asymmetric encryption, hash functions and MACs, mathematical foundations of cryptography, digital signatures, key exchange, authentication, and secure channels. The practical part covered digital certificates, public key infrastructures, cryptographic standards, secure messaging, and transport layer security.

System and network security

In the system and network security module, the topics included firewalls, stateless and stateful packet filters, application-level gateways, intrusion detection systems, authentication protocols, secure shell and layer 4 tunneling methods, virtual private networking, layer 2 authentication methods, and wireless security architectures. Practical use of network security tools was also taught in labs.

Malware and botnets

In the malware module, we looked at cybercrime in general, the spread of malware in the context of botnets, and how malware itself works. We learned the functional mechanisms of malware and analyzed the structure and behavior of malicious software through reverse engineering.