Teaching
Teaching
Note to our English readers: Since most of our courses and lectures are held in German, the corresponding teaching web pages are available mostly in German. We apologize for the inconvenience.
Anerkennung von Lehrveranstaltungen
Anerkennungen von Auslandssemestern, Gutachten und Empfehlungsschreiben durch Frau Prof. Eckert können nur nach einem persönlichen Gespräch erfolgen. Wir bitten Sie daher, über das Sekretariat einen Termin zu vereinbaren oder in die Sprechstunde zu kommen.
HINWEIS: Für Studierende der TU München werden VHB Informatik-Kurse generell nicht anerkannt, wenn entsprechende Module in der TUM-Informatik angeboten werden. Dies gilt insbesondere für den VHB Kurs IT-Sicherheit, dieser wird NICHT anerkannt.
Interdisziplinäre Projekte
Der Lehrstuhl I20 arbeitet sehr eng mit dem Lehrstuhl von Herrn Prof. Sigl in der Fakultät für Elektrotechnik zusammen. Herr Sigl betreut Informatik-Studierende bei der Durchführung von Interdisziplinären Projekten (IDPs) im Bereich Hardware-naher Sicherheit. Interessenten können sich gerne direkt an Herrn Sigl oder auch an Frau Eckert für weitere Informationen wenden.
Our chair cooperates closely with Prof. Sigl's electrical engineering chair. Prof. Sigl supervises computer science students that are interested in an Interdiciplinary Project (IDP) in the field of hardware-based security. If you are interested in such an IDP, feel free to contact Prof. Sigl or Prof. Eckert for additional information.
Wintersemester 2024/2025 | |
Vorlesung | |
IT Sicherheit (IN0042) (2+2 SWS / 5 ECTS-Credits) | |
Netzwerke fuer den Zahlungsverkehr (2 SWS / 3 ECTS-Credits) | |
Seminare | |
Concepts of Trust Establishment (2 SWS / 5 ECTS-Credits) | |
Cyber-Physical Systems Security (2 SWS / 5 ECTS-Credits) | |
Cyber-Resilient Systems (2 SWS / 5 ECTS-Credits) | |
Data Privacy Technologies (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2024 | |
Vorlesung | |
Hardware Security (2+2 SWS / 5 ECTS-Credits) | |
IT Sicherheit 2 (3+1 SWS / 5 ECTS-Credits) | |
Kryptografie (3+1 SWS / 5 ECTS-Credits) | |
Seminare | |
Cyber-Physical Systems Security (2 SWS / 5 ECTS-Credits) | |
Cyber-Resilient Systems (2 SWS / 5 ECTS-Credits) | |
Unsecuring Embedded Systems (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Rootkit Programming (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2023/2024 | |
Seminare | |
Concepts of Trust Establishment (2 SWS / 5 ECTS-Credits) | |
Formal Methods in IT Security (2 SWS / 5 ECTS-Credits) | |
Operational Technology Security (2 SWS / 5 ECTS-Credits) | |
Selected Topics of Protocol Security (2 SWS / 5 ECTS-Credits) | |
Verifiable Computation (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Advanced Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2023 | |
Vorlesung | |
Hardware Security (2+2 SWS / 5 ECTS-Credits) | |
IT Sicherheit 2 (3+1 SWS / 5 ECTS-Credits) | |
Kryptografie (3+1 SWS / 5 ECTS-Credits) | |
Netzwerke fuer den Zahlungsverkehr (2 SWS / 3 ECTS-Credits) | |
Seminare | |
Applications of Quantum Computing in IT Security (2 SWS / 5 ECTS-Credits) | |
Common Flaws in Protocol Security (2 SWS / 5 ECTS-Credits) | |
Software Security Analysis (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Low-Level Software Security (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2022/2023 | |
Seminare | |
Common Flaws in Protocol Security (2 SWS / 5 ECTS-Credits) | |
Kryptografie vs. Quantencomputing - Analyse der Bedrohung der aktuellen Kryptolandschaft (2 SWS / 5 ECTS-Credits) | |
Operational Technology Security (2 SWS / 5 ECTS-Credits) | |
Selected Topics of Secure Operating Systems (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Low-Level Software Security (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2022 | |
Vorlesung | |
Ausgewaehlte Themen aus dem Bereich Sicherheit und Datenschutz: Untertitel: 'IT-Sicherheit und Machine-Learning'. (2+2 SWS / 5 ECTS-Credits) | |
Sichere mobile Systeme (2+1 SWS / 4 ECTS-Credits) | |
Seminare | |
Common Flaws in Protocolsecurity (2 SWS / 5 ECTS-Credits) | |
Master-Seminar: Trusted Execution Environments (2 SWS / 5 ECTS-Credits) | |
Offensive and Defensive Measures in Wireless Security (2 SWS / 5 ECTS-Credits) | |
Software Security Analysis (2 SWS / 5 ECTS-Credits) | |
Systems Hardening (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2021/2022 | |
Vorlesung | |
Ausgewaehlte Themen aus dem Bereich IT-Sicherheit (2+2 SWS / 5 ECTS-Credits) | |
IT-Sicherheit (4+1 SWS / 7,0 ECTS-Credits) | |
Seminare | |
Common Flaws in Protocolsecurity (2 SWS / 5 ECTS-Credits) | |
Offensive and Defensive Measurements in Wireless Security (2 SWS / 5 ECTS-Credits) | |
Software Security Analysis (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2021 | |
Vorlesung | |
Sichere mobile Systeme (2+1 SWS / 4 ECTS-Credits) | |
Seminare | |
(In)Security of Online Voting (2 SWS / 5 ECTS-Credits) | |
Adversarial and Secure Machine Learning (2 SWS / 5 ECTS-Credits) | |
Data Privacy Technologies (2 SWS / 5 ECTS-Credits) | |
Intrusion Detection Systems (2 SWS / 5 ECTS-Credits) | |
Quantum computing - Practical and theoretical analysis of selected algorithms (2 SWS / 5 ECTS-Credits) | |
Software Security Analysis (2 SWS / 5 ECTS-Credits) | |
Systems Hardening (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Webapplication Security (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2020/2021 | |
Seminare | |
Audio Adversarial Examples (2 SWS / 5 ECTS-Credits) | |
Data Privacy Technologies (2 SWS / 5 ECTS-Credits) | |
Interdisciplinary Perspectives on Information Security (2 SWS / 5 ECTS-Credits) | |
Software Security Analysis (2 SWS / 5 ECTS-Credits) | |
Systems Hardening (2 SWS / 5 ECTS-Credits) | |
Trusted Execution Environment (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Rootkit programming (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2020 | |
Seminare | |
Adversarial and Secure Machine Learning (2 SWS / 5 ECTS-Credits) | |
Algebraic Methods and Algorithms in Cryptology (2 SWS / 5 ECTS-Credits) | |
Reverse Engineering (2 SWS / 5 ECTS-Credits) | |
Securing the Linux Kernel - Features and Attack Vectors (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2019/2020 | |
Vorlesung | |
Ausgewaehlte Themen aus dem Bereich IT-Sicherheit (2+2 SWS / 5 ECTS-Credits) | |
IT-Sicherheit (4+1 SWS / 7,0 ECTS-Credits) | |
Seminare | |
Adversarial and Secure Machine Learning (2 SWS / 5 ECTS-Credits) | |
Algebraic Methods and Algorithms in Cryptology (2 SWS / 5 ECTS-Credits) | |
Data Privacy Technologies (2 SWS / 5 ECTS-Credits) | |
Mobile Application Analysis (2 SWS / 5 ECTS-Credits) | |
Security Flaws (2 SWS / 5 ECTS-Credits) | |
Trusted Execution Environment (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2019 | |
Vorlesung | |
Sichere mobile Systeme (2+1 SWS / 4 ECTS-Credits) | |
Seminare | |
Adversarial and Secure Machine Learning (2 SWS / 5 ECTS-Credits) | |
Algebraic Methods and Algorithms in Cryptology (2 SWS / 5 ECTS-Credits) | |
Intrusion Detection Systems (2 SWS / 5 ECTS-Credits) | |
Next Generation Secure Computer Architectures (2 SWS / 5 ECTS-Credits) | |
Reverse Engineering (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Advanced Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Rootkit programming (6 SWS / 10 ECTS-Credits) | |
Trusted Execution Environment (TEE) and software security (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2018/2019 | |
Vorlesung | |
Ausgewaehlte Themen aus dem Bereich IT-Sicherheit (2+2 SWS / 5 ECTS-Credits) | |
IT-Sicherheit (3+1 SWS / 5,0 ECTS-Credits) | |
Seminare | |
Algebraic Methods and Algorithms in Cryptology (2 SWS / 5 ECTS-Credits) | |
Control Flow Integrity based Security (2 SWS / 5 ECTS-Credits) | |
Mobile Application Analysis (2 SWS / 5 ECTS-Credits) | |
Trusted Execution Environment and software security (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Honeynet & Malware Forensics (6 SWS / 10 ECTS-Credits) | |
Rootkit programming (6 SWS / 10 ECTS-Credits) | |
Sommersemester 2018 | |
Vorlesung | |
Sichere mobile Systeme (2+1 SWS / 4,0 ECTS-Credits) | |
Seminare | |
Adversarial and Secure Machine Learning (2 SWS / 5 ECTS-Credits) | |
Applied Cryptography (2 SWS / 5 ECTS-Credits) | |
Common Security Flaws in JavaScript based Applications (2 SWS / 5,0 ECTS-Credits) | |
Control Flow Integrity based Security (2 SWS / 5 ECTS-Credits) | |
Intrusion Detection Systems (2 SWS / 5,0 ECTS-Credits) | |
IoT Security in Automotive und Industrie 4.0 (2 SWS / 5 ECTS-Credits) | |
Linux Kernel Security Mechanisms for Process Separation and Isolation (2 SWS / 5 ECTS-Credits) | |
Mobile Application Security (2 SWS / 5 ECTS-Credits) | |
Next Generation Secure Computer Architectures (2 SWS / 5 ECTS-Credits) | |
Reverse Engineering (2 SWS / 5 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2017/2018 | |
Vorlesung | |
Grundlagen Betriebssysteme und Systemsoftware (3+2 SWS / 6,0 ECTS-Credits) | |
IT-Sicherheit (3+1 SWS / 5,0 ECTS-Credits) | |
Seminare | |
Common Security Flaws (2 SWS / 5,0 ECTS-Credits) | |
Control Flow Integrity based Security (2 SWS / 5,0 ECTS-Credits) | |
Large Scale Malware Analysis (2 SWS / 5,0 ECTS-Credits) | |
Praktika | |
Advanced Techniques in Binary Exploitation (6 SWS / 10,0 ECTS-Credits) | |
Binary Exploitation (6 SWS / 10,0 ECTS-Credits) | |
Web Application Security (6 SWS / 10,0 ECTS-Credits) | |
Sommersemester 2017 | |
Vorlesung | |
Ausgewaehlte Themen aus dem Bereich IT-Sicherheit (2 SWS / 3 ECTS-Credits) | |
Sichere mobile Systeme (2+1 SWS / 4,0 ECTS-Credits) | |
Seminare | |
Algebraic methods and algorithms in cryptology (2 SWS / 4 or 5 ECTS-Credits) | |
Code Reuse Attacks and Defenses against them (2 SWS / 5,0 ECTS-Credits) | |
Intrusion Detection System (2 SWS / 5,0 ECTS-Credits) | |
Reverse Engineering (2 SWS / 5 ECTS-Credits) | |
Proseminare | |
Common Security Flaws (2 SWS / 4,0 ECTS-Credits) | |
Praktika | |
Binary Exploitation (6 SWS / 10,0 ECTS-Credits) | |
Honeynet-Praktikum (6 SWS / 10,0 ECTS-Credits) | |
Rootkit Programming (6 SWS / 10,0 ECTS-Credits) | |
Web Application Security (6 SWS / 10 ECTS-Credits) | |
Wintersemester 2016/2017 | |
Vorlesung | |
Current Trends in IT Security (2+2 SWS / 5,0 ECTS-Credits) | |
Grundlagen Betriebssysteme und Systemsoftware (3+2 SWS / 6,0 ECTS-Credits) | |
IT-Sicherheit (3+1 SWS / 5,0 ECTS-Credits) | |
Seminare | |
Control Flow Integrity based Security (2 SWS / 5 ECTS-Credits) | |
Reverse Engineering (2 SWS / 5 ECTS-Credits) | |
Proseminare | |
Algebraische Methoden und Algorithmen in der Kryptologie (2 SWS / 4, ECTS-Credits) | |
Petri Nets (2 SWS / 4,0 ECTS-Credits) | |
Prime Numbers: Complexity and Algorithms (2 SWS / 4,0 ECTS-Credits) | |
Praktika | |
Anomaly Detection Challenges (0 SWS / 10 ECTS-Credits) | |
Sommersemester 2016 | |
Seminare | |
Large Scale Malware Analysis (2 SWS / 4 ECTS-Credits) | |
Wintersemester 2015/2016 | |
Praktika | |
Anomaly Detection Challenges (6SWS / 10ECTS-Credits) |