Main content

German original

(dt. IT-Sicherheit)

Level, degree of commitment in original study programme Intermediate module, compulsory elective module
Forms of teaching and learning,
Lecture (4 SWS), recitation class (2 SWS),
270 hours (90 h attendance, 180 h private study)
Credit points,
formal requirements
9 CP
Course requirement: Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks.
Examination type: Oral or written examination
The grading is done with 0 to 15 points according to the examination regulations for study course B.Sc. Computer Sciences.
Original study programme B.Sc. Informatik / Informatik Wahlpflichtmodule
One semester,
In der Regel jedes zweite Wintersemester
Person in charge of the module's outline Prof. Dr. Bernd Freisleben


The lecture deals with methods, tools and processes for the development of software systems that should be secure and reliable against malicious attacks and wrong inputs. The following topics will be covered:

1. cryptography

2. authentication & access control

3. vulnerability classes

4. OS security

5. mobile device security

6. network security

7. network attacks

8. malicious software

9. reverse engineering

10. web security

11. privacy

Qualification Goals

The aim of the module is to enable listeners to understand malicious attacks on software systems. After visiting the module, listeners should be able to design and implement secure software systems. The students practice scientific working methods (recognizing, formulating, solving problems, training abstract ability) and train oral communication skills in the exercises by practicing free speech in front of an audience and during discussion.


None. The competences taught in the following modules are recommended: Object-oriented Programming, either Algorithms and Data Structures or Practical Informatics II: Data Structures and Algorithms for Pre-Service-Teachers, System Software and Computer Communication.

Recommended Reading

  • Clauda Eckert: IT-Sicherheit: Konzepte, Verfahren, Protokolle, Oldenbourg, 2009. Ross Anderson: Security Engineering, Wiley, 2008. William Stallings: Network Security Essentials, Pearson, 2011.

Please note:

This page describes a module according to the latest valid module guide in Wintersemester 2022/23. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:

The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.

The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.