- Backups, Redundancy, and the Cloud: Computer Security Lectures 2014/15 S1
- Contingency Planning: Computer Security Lectures 2014/15 S1
- Dead System Analysis: Computer Security Lectures 2014/15 S1
- Ethics: Computer Security Lectures 2014/15 S1
- From Scanning to Exploitation: Computer Security Lectures 2014/15 S1
- Incident Response: Computer Security Lectures 2014/15 S1
- Information Gathering: Computer Security Lectures 2014/15 S1
- Information Security Management: Computer Security Lectures 2014/15 S1
- Integrity Management: Computer Security Lectures 2014/15 S1
- Intrusion Detection and Prevention Systems (IDS/IPS): Computer Security Lectures 2014/15 S1
- Live System Analysis - part 1: Computer Security Lectures 2014/15 S1
- Live System Analysis - part 2: Computer Security Lectures 2014/15 S1
- Lockpicking: Computer Security Lectures 2014/15 S1
- Malware Analysis - Dynamic Analysis: Computer Security Lectures 2014/15 S1
- Malware Analysis - Static Analysis: Computer Security Lectures 2014/15 S1
- Malware: Computer Security Lectures 2014/15 S1
- Post-exploitation: Computer Security Lectures 2014/15 S1
- Privacy: Computer Security Lectures 2014/15 S1
- Risk Management: Computer Security Lectures 2014/15 S1
- Software Vulnerabilities: Computer Security Lectures 2014/15 S1
- Unix, Free and Open Source Software, and Linux Security: Computer Security Lectures 2014/15 S1