SecurITy Guide to the Galaxy
Terms such as hackers, crackers, cyber espionage, script kiddies, privacy, cyber war etc. have been intensively discussed in the media in recent times. Setting aside all the fancy talk: What can we, as IT specialists, do to protect ourselves and especially our applications during development and after deployment? During these two weeks you will learn what issues really matter when it comes to IT security and what the right questions to ask are. The course is set in Vienna, the capital of Austria, with its astonishing historical, cultural and social heritage and opportunities.
If you know:
1) that cryptography is nothing Superman needs to be afraid of
2) that injection attacks have nothing to do with mad doctors
3) how to set Manner Schnitten on fire
4) you are *the* PARTYcipant that will rock IT this summer.
then you are in the right place!
- Fields of activity:
- Computer Engineering , Computer Science/Automatic Control/Informatics , Control Engineering/Systems engineering , Multimedia and Communication Design , Telecommunications/Electronics
- Content and topics:
- - IT security - secure software development - attack vectors - interactive hacking - social network security - mobile security - digital forensics
- Learning goals and objectives:
- The students should gain an understanding of the topics mentioned through theoretical lectures and practical laboratories.
- Examination type:
- Elaboration of a topic within a small group with a short presentation of the outcomes in the end.
- ECTS credits issued:
- 1.5 (estimated)
Information for applicants
- Selection criteria:
- We will select participants based on their Motivation Letters and list of relevant courses.
All of the following are covered by the event fee:
- You will stay in a hostel in the centre of Vienna. During the weekend trip you will probably be accommodated in a cottage.
- Cooked by our lovely orgaNICErs :) Three meals a day will be provided, at least one of them warm.
- Public transport, walking.