Teaching @ iSecLab


We currently offer four security courses related to the research we conduct in the lab. These courses are currently held at the TU Vienna and Institute Eurecom.

Summer Semester

  • Internet Security (InetSec 1), VU, 3.0 ECTS @ TU Vienna

  • This course presents the principal protocols and applications that are used in the Internet today, discussing in detail the related vulnerabilities and how they are exploited. For each vulnerability, possible protection and detection techniques are examined. The course includes a number of practical lab assignments where participants are required to apply their knowledge as well as a discussion of the current research in the field. Students will learn how the security of networks can be violated and how such attacks can be detected and prevented. The course aims to make the students "security aware" and gain a basic understanding about security issues. For students who are interested in advanced security topics and practical assignments, we offer the Internet Security 2 class in the winter semester.

  • Secure Programming I (SecProg I) @ Institute Eurecom

  • This course is an introductory security course. Similar to InetSec 1, the course discusses in detail programming vulnerabilities and how they are exploited. For each vulnerability, possible protection and detection techniques are examined. The course includes a number of practical and non-technical lab assignments that the participants are required to solve. The main aim of the course is to make the students "aware" of basic, technical security issues. For students who are interested in advanced security topics and practical assignments, we will offer the Secure Programming II class in the winter semester.

Winter Semester

  • Advanced Internet Security (InetSec 2), VU, 3.0 ECTS @ TU Vienna

  • Advanced Internet Security (i.e., InetSec 2) serves as a continuation for the class Internet Security. The idea is to present problems in more detail and allow students to apply their knowledge in practical exercises. Because the class will feature a number of programming exercises, students are required to have considerable programming experience. The lecture deals with common programming mistakes and ways to detect and avoid them. Examples are used to highlight general error classes, such as stack and heap overflows. As part of the class, students will participate in a hacking contest in which they can prove their knowledge of security and system management by competing with their peers.

  • Penetration Testing and Ethical Hacking, VU, 2.0 @ TU Vienna

  • This lecture aims at giving an in-depth look at penetration testing and its context in cyber-security. Participants are required to project themselves into the role of a "hacker" for the purpose of discovering and fixing security vulnerabilities in a corporate environment, a common approach to increase security for real-world corporations and entities. The individual parts of the lecture are arranged in a way that is roughly modeled after the well-known and accepted industry standard of the "CEH" (Certified Ethical Hacker) certification and exam. Specifically, this includes a discussion about ethical and legal considerations and on how to conduct penetration tests in accordance with legal requirements and corporate management. In a series of exercises that accompany the lecture, students have to actively analyze and probe a simulated corporate network (in our laboratory) to find security vulnerabilities. The findings have to be reported and counter-measures should be developed.

  • Software Development (SoftDev), @ Institute Eurecom

  • SoftDev aims at providing students with a common knowledge about the concepts of programming and software development in a Unix-like environment. In particular, the course will focus on Unix command line interface and the Python language. At the end of the course, students will learn "how to use a computer" from a programmer's and engineer's point of view. In particular, they will learn how to use the existing command lines tools, and how to design and implement a program to solve a given problem.

  • Secure Programming II (SecProg II), @ Institute Eurecom

  • SecProg II serves as a continuation for the class SecProg I. The course description will be updated soon. The idea is to present problems in more detail and allow students to apply their knowledge in practical exercises. Because the class will feature a number of programming exercises, students are required to have considerable programming experience. The lecture deals with common programming mistakes and ways to detect and avoid them. Examples are used to highlight general error classes, such as stack and heap overflows.

Internships (Praktika), Master's and Ph.D. Theses


Last Modified: Mon Apr 7 13:05:39 CEST 2014


International Secure Systems Lab www.iseclab.org