Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/99/68/83/99688396-11fa-5cc5-0b13-d730e38d6ab4/mza_6475580731008583317.jpeg/600x600bb.jpg
Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Prof. Dr. Christoph Meinel
20 episodes
10 hours ago
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues. Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!
Show more...
Courses
Education
RSS
All content for Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK is the property of Prof. Dr. Christoph Meinel and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues. Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!
Show more...
Courses
Education
Episodes (20/20)
Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Law and Ethics
4 years ago
1 hour 7 minutes 49 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Detection of Attacks and Intrusions
4 years ago
1 hour 29 minutes 43 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Wireless Security
4 years ago
1 hour 21 minutes 26 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of the World Wide Web - Web-Server as the Target
4 years ago
1 hour 7 minutes 2 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of the World Wide Web - Web-Browser as the Target
4 years ago
1 hour 6 minutes 29 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of Windows and macOS - Attacks & Exploits
4 years ago
1 hour 15 minutes 39 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of Unix / Linux - Attacks & Exploits
4 years ago
1 hour 3 minutes 18 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Design and Programming Errors
4 years ago
26 minutes 20 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of Internet Protocols (2)
4 years ago
1 hour 20 minutes 8 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Weaknesses of Internet Protocols
4 years ago
1 hour 14 minutes 21 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Attacks on Accounts and Passwords
4 years ago
1 hour 13 minutes 34 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
OS Fingerprinting
4 years ago
23 minutes 48 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
(Online) Reconnaissance
4 years ago
22 minutes 41 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Human Factor and Technical Failures
4 years ago
37 minutes 10 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Cyber Crime: Criminals and Motives
4 years ago
19 minutes 49 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Risk Analysis
4 years ago
55 minutes 5 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Hackers and Viruses
4 years ago
1 hour 8 minutes 48 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
First Understanding of Internet and WWW
5 years ago
1 hour 27 minutes 27 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Internet Security - An Overview
5 years ago
59 minutes 33 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
Introduction and Table of Content
5 years ago
15 minutes 19 seconds

Internet Security - Weaknesses and Targets (WT 2020/21) - tele-TASK
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues. Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!