- Access Controls Part 1: Computer Security Lectures 2014/15 S2
- Access Controls Part 2: Computer Security Lectures 2014/15 S2
- Bug Hunting and Exploit Development 1: Finding Flaws Using Static Analysis
- Bug Hunting and Exploit Development 2: Finding Flaws Using Fuzzing 1
- Bug Hunting and Exploit Development 3: Finding Flaws Using Fuzzing 2
- Ethics: Computer Security Lectures 2014/15 S2
- From Scanning to Exploitation: Computer Security Lectures 2014/15 S2
- Information Gathering: Computer Security Lectures 2014/15 S2
- Introduction to Ethical Hacking: Computer Security Lectures 2014/15 S2
- Introduction to Security Mechanisms: Computer Security Lectures 2014/15 S2
- Isolation Sandboxes and Application-oriented Access Controls: Computer Security Lectures 2014/15 S2
- Lockpicking part 1: Computer Security Lectures 2014/15 S2
- Lockpicking part 2: Computer Security Lectures 2014/15 S2
- Personal Privacy and Security: Computer Security Lectures 2014/15 S2
- Post-exploitation: Computer Security Lectures 2014/15 S2
- Privacy: Computer Security Lectures 2014/15 S2
- Rule-based Sandboxes and Application-oriented Access Controls: Computer Security Lectures 2014/15 S2
- Security Concepts: Computer Security Lectures 2014/15 S2
- Software Vulnerabilities: Computer Security Lectures 2014/15 S2
- Understanding Vulnerabilities 1: C, ASM, and Overflows: Computer Security Lectures 2014/15 S2
- Understanding Vulnerabilities 2: Categories of Flaws: Computer Security Lectures 2014/15 S2