{"id":246,"date":"2018-10-01T08:54:32","date_gmt":"2018-10-01T07:54:32","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?p=246"},"modified":"2018-10-01T08:54:34","modified_gmt":"2018-10-01T07:54:34","slug":"systemsicherheit","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=246","title":{"rendered":"Systemsicherheit"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Informationen zur Vorlesung Systemsicherheit<\/p>\n<p><!--more--><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><ul>\n<li><span style=\"line-height: 13px;\">Vorlesungsnummer:\u00a057721<\/span><\/li>\n<li>Umfang: 4 SWS<\/li>\n<li>Aufwand: 5 CP<\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p>Die Vorlesung findet statt am:<\/p>\n<ul>\n<li><span style=\"line-height: 13px;\">Montag, 14.00 bis 15:30 Uhr, Raum G2 0.37<\/span><\/li>\n<li>Donnerstag, 8:00 bis 9:30 Uhr, Raum G2 1.44<\/li>\n<\/ul>\n<p>Die Vorlesung <em><strong>entf\u00e4llt<\/strong><\/em> an folgenden Terminen:<\/p>\n<ul>\n<li>Donnerstag, 5.4.2018<\/li>\n<li>Montag, 30.4.2018<\/li>\n<\/ul>\n<p>Die\u00a0<em><strong>Ersatztermine<\/strong><\/em>\u00a0finden statt am:<\/p>\n<ul>\n<li>Montag, 18.6.2018, 17:30 bis 21:00 Uhr<\/li>\n<\/ul>\n<p>Die <em><strong>m\u00fcndlichen Pr\u00fcfungen<\/strong><\/em> finden an folgenden Terminen statt:<\/p>\n<ul>\n<li>Dienstag, 24.7.2018<\/li>\n<li>Mittowch, 25.7.2018<\/li>\n<li>Donnerstag, 26.7.2018<\/li>\n<\/ul>\n<p>F\u00fcr die Pr\u00fcfung ist eine Anmeldung inklusive Terminabsprache erforderlich. Vor der Pr\u00fcfung ist folgende <a href=\"\/docs\/SYSI\/einverstaendnis-erklaerung.pdf\">Einverst\u00e4ndniserkl\u00e4rung<\/a> auszuf\u00fcllen und abzugeben. Die Pr\u00fcfungen finden im Raum G2 2.19 statt.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Unterlagen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-246-1\"><div class=\"fusion-panel panel-default panel-0670aaa69f7c573c7 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0670aaa69f7c573c7\"><a aria-expanded=\"false\" aria-controls=\"0670aaa69f7c573c7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#0670aaa69f7c573c7\" href=\"#0670aaa69f7c573c7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"0670aaa69f7c573c7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0670aaa69f7c573c7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"text-align: left; padding-left: 30px;\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/MH\/lv-57721-systemsicherheit.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p style=\"text-align: left; padding-left: 30px;\">Stand: 15.3.2014<\/p>\n<p style=\"text-align: left; padding-left: 30px;\"><\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-fe01f0199760dcb4c fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fe01f0199760dcb4c\"><a aria-expanded=\"false\" aria-controls=\"fe01f0199760dcb4c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#fe01f0199760dcb4c\" href=\"#fe01f0199760dcb4c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">\u00dcbersicht<\/span><\/a><\/h4><\/div><div id=\"fe01f0199760dcb4c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fe01f0199760dcb4c\"><div class=\"panel-body toggle-content fusion-clearfix\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le00-uebersicht.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le00-uebersicht-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\nStand: 6.3.2018<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-a5785a6dea515716d fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a5785a6dea515716d\"><a aria-expanded=\"false\" aria-controls=\"a5785a6dea515716d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#a5785a6dea515716d\" href=\"#a5785a6dea515716d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Grundlegende Arbeiten<\/span><\/a><\/h4><\/div><div id=\"a5785a6dea515716d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a5785a6dea515716d\"><div class=\"panel-body toggle-content fusion-clearfix\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-4 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le01-grundlagen.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-5 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le01-grundlagen-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\nStand: 11.3.2018<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8b4b0f7a5c1756d6a fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8b4b0f7a5c1756d6a\"><a aria-expanded=\"false\" aria-controls=\"8b4b0f7a5c1756d6a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#8b4b0f7a5c1756d6a\" href=\"#8b4b0f7a5c1756d6a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Sicherheitsrichtlinien<\/span><\/a><\/h4><\/div><div id=\"8b4b0f7a5c1756d6a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8b4b0f7a5c1756d6a\"><div class=\"panel-body toggle-content fusion-clearfix\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-6 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le02-policies.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-7 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le02-policies-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 21.3.2018<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-7ee35e1086a7e39da fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7ee35e1086a7e39da\"><a aria-expanded=\"false\" aria-controls=\"7ee35e1086a7e39da\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#7ee35e1086a7e39da\" href=\"#7ee35e1086a7e39da\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">SE Linux<\/span><\/a><\/h4><\/div><div id=\"7ee35e1086a7e39da\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7ee35e1086a7e39da\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-8 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le03-selinux.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-9 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le03-selinux-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-3ec792541c8193fe0 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3ec792541c8193fe0\"><a aria-expanded=\"false\" aria-controls=\"3ec792541c8193fe0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#3ec792541c8193fe0\" href=\"#3ec792541c8193fe0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Authentisierung<\/span><\/a><\/h4><\/div><div id=\"3ec792541c8193fe0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3ec792541c8193fe0\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-10 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le04-authentisierung.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-11 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le04-authentisierung-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-12 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/praktikum-pki.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Praktikum PKI<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-13 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/pki-openssl.conf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">OpenSSL Konfiguration<\/span><\/a><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-3d92289d105e37747 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3d92289d105e37747\"><a aria-expanded=\"false\" aria-controls=\"3d92289d105e37747\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#3d92289d105e37747\" href=\"#3d92289d105e37747\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Security Engineering<\/span><\/a><\/h4><\/div><div id=\"3d92289d105e37747\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3d92289d105e37747\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-14 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le05-security-engineering.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-15 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le05-security-engineering-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-cc717a210f336bf69 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_cc717a210f336bf69\"><a aria-expanded=\"false\" aria-controls=\"cc717a210f336bf69\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-246-1\" data-target=\"#cc717a210f336bf69\" href=\"#cc717a210f336bf69\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Sicherheit von Webanwendungen<\/span><\/a><\/h4><\/div><div id=\"cc717a210f336bf69\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_cc717a210f336bf69\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-16 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le06-webapp-security.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-17 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"\/docs\/SYSI\/le06-webapp-security-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen in diesem Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#47;&#x2f;i&#x74;&#x73;&#46;&#x69;n&#x66;&#x6f;&#114;&#x6d;a&#x74;&#x69;&#107;&#x2e;h&#x74;&#x77;&#45;&#x61;a&#x6c;&#x65;&#110;&#x2e;d&#x65;&#x2f;&#119;&#x70;\/&#x77;&#x70;&#45;&#x63;o&#x6e;&#x74;&#101;&#x6e;t&#x2f;&#x75;&#112;&#x6c;o&#x61;&#x64;&#115;&#x2f;2&#x30;&#x31;&#51;&#x2f;0&#x33;&#x2f;&#107;&#x72;y&#x70;&#x74;&#111;&#x67;r&#x61;&#x66;&#105;&#x65;-&#x36;&#x36;&#48;&#x78;4&#x30;&#x35;&#64;&#x32;x&#x2e;&#x6a;&#112;&#x67; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:\/&#47;&#105;&#x74;&#x73;&#x2e;&#x69;n&#102;&#111;&#114;&#x6d;&#x61;&#x74;ik&#46;&#104;&#x74;&#x77;&#x2d;aa&#108;&#101;&#x6e;&#x2e;&#x64;e\/&#119;&#112;&#x2f;&#x77;&#x70;-c&#111;&#110;&#x74;&#x65;&#x6e;t\/&#117;&#112;&#x6c;&#x6f;&#x61;&#x64;s&#47;&#50;&#x30;&#x31;&#x38;&#x2f;1&#48;&#47;&#115;&#x69;&#x63;&#x68;er&#101;&#45;&#x77;&#x65;&#x62;an&#119;&#101;&#x6e;&#x64;&#x75;ng&#101;&#110;&#x2d;&#x33;&#x32;0x&#50;&#48;&#x32;&#x40;&#x32;x&#46;&#106;&#112;&#x67; 640w, https:&#47;&#x2f;&#105;&#x74;s&#x2e;i&#110;&#x66;&#111;&#x72;m&#x61;t&#105;&#x6b;&#46;&#x68;t&#x77;-&#97;&#x61;&#108;&#x65;n&#x2e;d&#101;&#x2f;&#119;&#x70;\/&#x77;p&#45;&#x63;&#111;&#x6e;t&#x65;n&#116;&#x2f;&#117;&#x70;l&#x6f;a&#100;&#x73;&#47;&#x32;0&#x31;8&#47;&#x31;&#48;&#x2f;s&#x69;c&#104;&#x65;&#114;&#x65;-&#x77;e&#98;&#x61;&#110;&#x77;&#101;&#x6e;d&#117;&#x6e;&#103;&#x65;&#110;&#x2d;7&#48;&#x30;&#120;&#x34;&#52;&#x31;&#64;&#x32;&#x78;&#46;&#x6a;&#112;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;&#x6e;&#x2e;&#x64;&#x65;&#x2f;&#x77;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#x61;&#x64;&#x73;&#x2f;&#x32;&#x30;&#x31;&#x36;&#x2f;&#x30;&#x34;&#x2f;&#x77;&#x61;&#x68;&#x72;&#x73;&#x63;&#x68;&#x65;&#x69;&#x6e;&#x6c;&#x69;&#x63;&#x68;&#x6b;&#x65;&#x69;&#x74;&#x2d;&#x33;&#x32;&#x30;&#x78;&#x32;&#x30;&#x32;&#x40;&#x32;&#x78;&#x2e;&#x6a;&#x70;&#x67; 640w, https:&#x2f;&#x2f;&#x69;&#116;&#115;&#46;i&#x6e;&#x66;&#x6f;&#114;&#109;at&#x69;&#x6b;&#x2e;&#104;&#116;w-&#x61;&#x61;&#x6c;&#101;&#110;&#46;d&#x65;&#x2f;&#x77;&#112;&#47;wp&#x2d;&#x63;&#x6f;&#110;&#116;&#101;n&#x74;&#x2f;&#x75;&#x70;&#108;&#111;a&#x64;&#x73;&#x2f;&#x32;&#48;&#49;6\/&#x30;&#x34;&#x2f;&#119;&#97;hr&#x73;&#x63;&#x68;&#101;&#105;nl&#x69;&#x63;&#x68;&#107;&#101;it&#x2d;&#x37;&#x30;&#48;&#120;44&#x31;&#x40;&#x32;&#120;&#46;&#106;p&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:&#x2f;&#47;i&#x74;&#115;&#46;&#x69;&#110;f&#x6f;&#114;m&#x61;&#116;i&#x6b;&#x2e;h&#x74;&#x77;&#45;&#x61;&#x61;&#108;&#x65;&#x6e;&#46;d&#x65;&#47;w&#x70;&#47;w&#x70;&#45;c&#x6f;&#110;t&#x65;&#x6e;t&#x2f;&#x75;&#112;&#x6c;&#x6f;&#97;&#x64;&#x73;&#47;2&#x30;&#49;6&#x2f;&#49;0&#x2f;&#115;i&#x63;&#104;e&#x72;&#x65;-&#x70;&#x72;&#111;&#x67;&#x72;&#97;&#x6d;&#x6d;&#105;e&#x72;&#117;n&#x67;&#45;3&#x32;&#48;x&#x32;&#48;2&#x40;&#x32;x&#x2e;&#x6a;&#112;&#x67; 640w, https:\/&#47;&#105;&#x74;&#x73;&#46;&#105;&#110;&#x66;&#x6f;&#x72;m&#97;&#116;&#x69;&#x6b;&#46;h&#116;&#x77;&#x2d;&#x61;a&#108;&#101;&#x6e;&#x2e;de&#47;&#x77;&#x70;&#x2f;w&#112;&#45;&#x63;&#x6f;nt&#101;&#x6e;&#x74;&#x2f;u&#112;&#108;&#x6f;&#x61;&#x64;s&#47;&#50;&#x30;&#x31;6&#47;&#49;&#x30;&#x2f;&#x73;i&#99;&#104;&#x65;&#x72;e-&#112;&#x72;&#x6f;&#x67;r&#97;&#109;&#x6d;&#x69;er&#117;&#x6e;&#x67;&#x2d;7&#48;&#48;&#x78;&#x34;41&#64;&#x32;&#x78;&#x2e;j&#112;&#103; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Informationen zur Vorlesung Systemsicherheit<\/p>\n","protected":false},"author":2,"featured_media":254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[9,8,15],"class_list":["post-246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung","tag-it-sicherheit","tag-systemsicherheit","tag-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"version-history":[{"count":138,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":1793,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions\/1793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/254"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}