This video belongs to the openHPI course Datensicherheit im Netz – Einführung in die Informationssicherheit. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00I'm happy. You to our first openHPI combined course to be able to welcome, who is concerned with different topics in the field of cybersecurity.
- 00:12That's a novelty, that's a novelty on HPI, that we summarize workshops on one main topic and want to offer an exam across these different workshops.
- 00:24The openHPI workshop format, that's always 14 days, the normal course is 6 weeks,
- 00:31and we want with 3 such workshops to a special topic in each case in the area of Cybersecurity, to do a thorough examination, as is the case with the usual HPI courses.
- 00:47Well, that's a fact, three times two weeks is six weeks, The proof of performance then corresponds to the proof of performance. for a regular 6-week openHPI course.
- 00:58How's that gonna work?
- 00:59You are invited to actively participate in each of the 3 workshops.
- 01:05For each of the workshops they would acquire a certificate of participation, that is to say, carry out a sufficient number of activities to achieve this.
- 01:15And then you have the chance, if you want to, to obtain another certificate, to enroll in a final exam course,
- 01:24and this exam course, which only consists of the final exam, which then picks up the topics of these 3 workshops and asks.
- 01:33You can get a report card, you can get a report card, if you book camera, online observation, get a qualified certificate,
- 01:43if you meet the usual requirements, and that is, that you get at least 50% of the possible score.
- 01:52The first workshop that we want to offer starts on 16.., it runs until 30.01.2019 and deals with the introduction to information security.
- 02:04The title is "Data Security on the Net - Introduction to Information Security"
- 02:10and what should be discussed is how to protect data on the Internet, when you transfer data over the Internet.
- 02:21These are open information channels, anyone who has access to the Internet, in principle also has access to the data that is sent there,
- 02:31and if you don't protect the data, it's encrypted, with cryptographic methods, then anyone can, who intercepted the data can also see the content.
- 02:46So we want to show what methods there are, cryptographic techniques, want to talk about encryption, digital signatures, to make this data transport safe.
- 02:58So the aim of this first workshop in our combined series is, Create awareness of the need for data security,
- 03:06Introduction to cryptographic procedures and the methods of secure communication.
- 03:12The second openHPI workshop we want to offer, which starts from 20.02. and runs until 6. March 2019,
- 03:22and then it's about digital identities, who am I on the net.
- 03:26Besides the physical identity that we clearly represent in our world, it is necessary that if you use any services on the Internet, that you're doing this under a digital identity.
- 03:42Typically, you also have multiple digital identities, we want to ask what it is, and we want to discuss why we need it.
- 03:51This is what you need, for example, if you want to do online banking or if you want to use social networks, shopping on the Internet,
- 03:58then this service provider needs to know who you are. How do you pay, did you pay, what do you want?
- 04:09And for this accounts are set up, accounts, that's then, the data that's being collected is some kind of digital identity,
- 04:18and these digital identities are, of course. a very attractive target for cyber criminals.
- 04:25So, goal of this second openHPI workshop from our series on Cybersecurity is, present the introduction to identity management,
- 04:39Discuss ways to authenticate identities and how to protect your digital identity from attack.
- 04:49So, and then we have a third workshop, which starts on 27 March and runs until 11 April, and that's about Blockchain.
- 04:59What does Blockchain have to do with security?
- 05:01Blockchain is a technology, with which security can be achieved and guaranteed without a Trust Center.
- 05:13And that's why it's very interesting, when you're talking about cybersecurity--
- 05:18Blockchain itself is also a very interesting topic, so we thought it was nice, to offer information in this series,
- 05:25because this blockchain technology allows a safe application on a system, where there is no boss, where decentralized all distributed systems are equal.
- 05:37And you know Blockchain from the use of this technology for the crypto currency Bitcoin,
- 05:46so even financial transactions can be done with this technology.
- 05:51What's behind it, why it works, it's a successful combination of techniques,
- 05:58which were already known before, but which are skilfully brought together, namely the work in decentralized networks, cryptographic methods and then consensus algorithms.
- 06:09What we want to achieve in the workshop, is a first introduction to the concepts and architecture of the Blockchain and then, of course, into the applications of security technologies.
- 06:19We will then end this workshop, even with an overview beyond areas of application that go far beyond such crypto currencies.
- 06:29These 3 workshops can be bundled, Of course you need a certificate of attendance for each workshop,
- 06:39and then you can bundle them up and get a report card. on the subject of Cybersecurity Basics.
- 06:47You can also obtain a qualified certificate, if you then turn on this online monitoring and can then also get ECTS, namely 3.
- 07:02The certificate of achievement can also be sent after the official end of the course. of the workshop can still be achieved,
- 07:09and we've once planned this year to offer two possible examination periods:
- 07:15Once a month in May, that you take that two-hour exam, and then once in November.
- 07:26Prerequisite for participation in this examination course - that's also checked out then - is,
- 07:31that the certificate of attendance was obtained in all 3 workshops, which means that at least 50% of the teaching content has been processed there.
- 07:41The certificate of attendance, which is issued at each workshop, which of course also have their meaning independently of the other workshops,
- 07:51so we're confirming participation in each of these security workshops, if at least 80% of the learning content has been completed.
- 08:01Such a graded confirmation of participation can be obtained, if you take the weekly tests - we'll be there every week, as you know, offer a test -
- 08:13in the individual courses, so the homework does with the least 50 % points.
- 08:21And then you can get this certificate, this combined performance certificate, if you can present the certificate of participation in all 3 workshops and then participates in this final examination.
- 08:37The qualified certificate, to mention it again, can be obtained under the same conditions as the testimony.
- 08:47You just have to turn on this online supervision for this final exam. - because that is natural, the qualified certificate - then with photo and everything,
- 08:57and this can also be reinforced with ECTS credit points, if it's interesting for students, for example.
- 09:06So let's try this, we're interested, to learn if you like it.
- 09:14We hope to be able to offer you, as a learner, as an interested learner a little more flexibility,
- 09:21because such a coherent 6-week course then nevertheless with strenuous occupation, with family and other things is quite a challenge after all.
- 09:33Well, let's see how it works.
- 09:34We would be pleased if the format suits you.
To enable the transcript, please select a language in the video player settings menu.