The Hasso Plattner Institute offers a practically-oriented computer science study program at an internationally recognized institute. This study includes the Germany-wide unique "IT-Systems Engineering" program and the new master programs: "Digital Health", "Data Engineering", and "Cybersecurity."
Research at the Hasso Plattner Institute is characterized by standards of scientific excellence, practical relevance and close cooperation with industry and society. Outstanding research results are achieved in the fields of specialization, in excellent research programs and at the international Research School.
The Hasso Plattner Institute in Potsdam is unique on the German academic landscape. The institute's program continues to grow with the support of its founder Hasso Plattner and through international cooperation. Find out more about the founder, events and studies at HPI.
The Hasso Plattner Institute has educational programs for both high school students and working professionals. It operates its own IT learning platform - openHPI - which provides free online courses. The Youth Academy organizes computer science camps and events for high school students. Professionals can take advantage of educational opportunities in the field of Design Thinking at the HPI Academy.
Operating Systems & Information Systems Technology
Software Architecture & Modeling Technology
(last update: 01.09.2014)
This experimental project seminar is about advanced techniques in practical system and networking security.
We will have two teams defeating each other or the tutoring team within four challenges - with changing roles either as an attacker or defender of a target IT system.
For each challenge, the teams will have 2-4 weeks to prepare their arms: setting up a secure system (under given constraints) for the defenders, choosing and testing recon and penetration tools for the attackers. After preparation, the teams will fight out a supervised Capture-the-Flag contest.
Topics for the challenges:
0. Preliminary Impression
1. System- and Network Security
2. Web- and Service/Application Security
3. The whole bunch
Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!
Good knowledge in
networking technologies (TCP/IP stack, ...)
operating systems (memory management, ...)
Very good knowledge in security basics (i.e., lecture on Internet Security - Weaknesses and Targets)
Only 10 participants will be accepted for this seminar.
If you got interest while seeing this page, please do not wait and just drop an email to Feng to show your interest and then come to the first session on April 112014 in H E.51.
The invitation email will be sent to the selected participant after the first session. Frau Pamperin will accept the subscription of the selected participants on the list. Please do not directly subscribe by her.
William R. Cheswick, Steven M. Bellovin, “Firewalls and Internet Security</b>”, second Edition, Addison-Wesley, 2003.</li>
Andrew S. Tanenbaum, "<link />Computer Networks</b>", fourth edition, Prentice Hall PTR, 2003. </li>
Charlie Kaufman, Radia Perlman, and Mike Speciner. "<link />Network Security: Private Communication in a Public World</b>", second Edition, Prentice Hall PTR, 2002.</li>
Dafydd Stuttard, Marcus Pinto, "<span id="btAsinTitle">The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws</b>", Wiley & Sons, 2007.</li>