Main content

CS 515 — IT-Security
(dt. IT-Sicherheit)

Level, degree of commitment Advanced module, depends on importing study program
Forms of teaching and learning,
Lecture (4 SWS), recitation class (2 SWS),
270 hours (90 h attendance, 180 h private study)
Credit points,
formal requirements
9 CP
Course requirement(s): Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks.
Examination type: Oral examination (individual examination) or written examination
The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science.
Subject, Origin Computer Science, B.Sc. Computer Science
One semester,
each summer semester
Person in charge of the module's outline Prof. Dr. Elmar Tischhauser, Prof. Dr. Bernd Freisleben


The lecture deals with methods, tools and processes for developing systems that should be secure and reliable against malicious attacks and incorrect input. In particular, the following topics will be addressed:

  • Cryptography basics
  • Authentication & Access Control
  • Vulnerability Classes
  • OS Security
  • Mobile Device and IoT Security
  • Network Security
  • Network Attacks
  • Malicious Software
  • Reverse Engineering
  • Web Security
  • Privacy Security
  • Cloud Security

Understanding and application of the concepts presented in the lecture will be practiced in the exercise, especially the security evaluation of software and systems as well as best practices for the use of security procedures in different application scenarios.

Qualification Goals

Students will be able to,

  • understand malicious attacks on software systems,
  • design and implement secure software systems
  • Are able to apply scientific work methods in independently identifying, formulating and solving problems,
  • are able to speak freely about scientific content, both in front of an audience and in a discussion.


None. The competences taught in the following modules are recommended: Object-oriented Programming, either Algorithms and Data Structures or Practical Informatics II: Data Structures and Algorithms for Pre-Service-Teachers, System Software and Computer Communication.

Recommended Reading

  • Ross Anderson: “Security Engineering”, Wiley-Verlag, 2008
  • Claudia Eckert: “IT-Sicherheit”, de Gruyter, 2018
  • Doug Stinson: Cryptography: Theory and Practice, Taylor&Francis, 2019

Please note:

This page describes a module according to the latest valid module guide in Winter semester 2023/24. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:

The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.

The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.