- Ethics: Computer Security Lectures 2014/15 S1
- From Scanning to Exploitation: Computer Security Lectures 2014/15 S1
- Information Gathering: Computer Security Lectures 2014/15 S1
- Lockpicking: Computer Security Lectures 2014/15 S1
- Malware: Computer Security Lectures 2014/15 S1
- Post-exploitation: Computer Security Lectures 2014/15 S2
- Privacy: Computer Security Lectures 2014/15 S1
- Software Vulnerabilities: Computer Security Lectures 2014/15 S1
- Unix, Free and Open Source Software, and Linux Security: Computer Security Lectures 2014/15 S1