Teaching Activities

Click on the affiliation your are interesting in to receive details:



Besides lecturing I supervise students in their trainings and final theses (e.g., BA, MA). For details on concluded, running, and open topics click here.





@ Research Institute CODE, Universität der Bundeswehr München, Neubiberg, Germany

Lecture Introduction to the Internet of Things

  • M.Sc.
  • Winter term: 2021
  • Creator of the lecture itself and invited lecturer (teaching assignment)
  • Description: Digitalization is changing our lives. There are more and more digital, networked, intelligent products, services or business models. Fitness trackers, smart homes, self-propelled cars, robots, predictive maintenance are just a few examples. The Internet of Things (IoT) connects the physical world with the digital world. IoT is increasingly becoming an integral part of the business or for consumers. Devices are no longer controlled only by users, but devices communicate directly to automate tasks or processes. This produces a flood of data that offers enormous opportunities but also harbors risks. To be able to assess this, this lecture introduces the topic and presents basics regarding architecture and requirements, used communication and routing protocols and looks at some applications.


Lecture Secure Mobile Systems

  • M.Sc.
  • Spring term: 2020
  • Creator of the lecture itself and invited lecturer (teaching assignment)
  • Description: The use of mobile devices has penetrated our lives in almost all areas. Making phone calls as the original and primary use of these devices is today only one of a multitude of functionalities that a mobile device provides. Since the introduction of the operating systems iOS and Android, the number of mobile devices using these operating systems has increased enormously every year. At the same time, the number of attacks on information systems and networks, e.g. via malware and denial of service attacks, is increasing, which underlines the importance of securing systems and networks with appropriate security measures. The lecture builds on the course "Mobile Communication Systems". There the most common standards and systems were discussed, but security aspects were neglected. Therefore, this course "Secure Mobile Systems" is dedicated to this topic and considers selected technologies among others: WLAN and IEEE 802.11, Bluetooth, sensor networks (IEEE 802.15.4, ZigBee, 6LoWPAN, LoRa), hardware solutions (Trusted Computing (TPM) and physically non-clonable functions (PUF)), Smartcards, and mobile payment. The aim is to gain a basic understanding of the technologies we use every day and rely on their security. What is behind them and are they really as secure as we think?


Lecture Introduction to Computer Networks

  • B.Sc.
  • Spring terms: 2020, 2019, and 2018
  • Lecturer substitute and exercise organizer; invited lecturer (teaching assignment) in 2019 on behalf of Prof. Dreo Rodosek (on sabbatical)
  • Description: The course teaches the basic knowledge of computer networks and communication protocols. Many sections use the Internet and its communication protocols as practical examples. The essential and fundamental concepts of computer networks are introduced and relevant standards are presented, including services and reference models for communication. The basic concepts then include the discussion of network building blocks, point-to-point connections, resource allocation/multi-use, and error detection and correction procedures. Using the example of Ethernet, an important local media access procedure is described. In addition to packet and line switching including the necessary protocols on the network layer, Internetworking is also covered, which includes the various coupling elements such as repeaters, switches and routers including the routing methods. Furthermore, transport protocols are discussed and associated protocol mechanisms are discussed for control purposes. On the application layer the Domain Name System, the E-Mail System and the WWW are sketched and their essential functions are described.


Lecture Computer Networks 2

  • M.Sc.
  • Winter term: 2020
  • Lecturer substitute
  • Description: The course is an extension of the "Introduction to Computer Networks" and deals with further questions in the field of communication systems. The convergence of voice and data results in new requirements for computer networks. Ensuring the quality of service for applications such as Voice over IP (VoIP) is one of the most important challenges. The module therefore focuses on: Quality of service mechanisms in IP networks, QoS possibilities with different network technologies, Internet support protocols for multimedia applications (Multicast, RTP, IntServ, DiffServ, MPLS, RTSP), digital voice and video on the Internet (H.323, SIP, MPEG, VoIP), and virtual private networks (technology, application possibilities with IPSec and MPLS, case studies).


Lecture Mobile Communication Systems

  • M.Sc.
  • Autumn terms: 2019 and 2018
  • Lecturer substitute and exercise organizer
  • Description: The lecture provides in-depth insights into the technical basics and concepts of mobile communication systems. Furthermore mobile and wireless telecommunication systems (e.g. GSM, UMTS, LTE), satellite systems, broadcasting systems and in detail wireless LANs and PANs (e.g. WLAN, Bluetooth) are discussed. In order to make these technological alternatives usable in an integrated network landscape, the network protocol properties will be discussed using the example of Mobile IP as well as the transport protocol properties, which will then be supplemented by mobility support.


Lecture Security in Information Technology

  • M.Sc.
  • Winter term: 2020
  • Spring terms: 2020 and 2019
  • Lecturer substitute and special lecture on "Applied Cryptography - Hardware-based Trust"
  • Description: The course covers classic methods of technical and organizational information security, including threats and risk analysis, BSI IT-Grundschutz, basics of applied cryptography, security engineering, security models and mechanisms and their implementation in distributed, systems and computer networks, and mobile device security.


Seminar IT-Security

  • B.Sc., M.Sc.
  • Winter terms: 2021, 2020, and 2019
  • Organizer and supervisor of various topics; teaching assignment since 2020
  • Description: In 2016 the first large-scale attack on IoT devices took place: "Friday October 21, 2016, after 11:10 UTC. If you typed the URL of some well-known US Internet service providers into your browser there was no response, and no online services available. The reason: the Mirai botnet had hacked millions of mainly Linux-based Internet-Of-Things devices and collectively performed a Denial-Of-Service attack on the Domain-Name-Service provider DYN with the result that the IP-addresses of hundreds of company services could not be accessed anymore. It was like removing the telephone number of these organizations in a way that customers could not contact them.” SmartHome devices conquer our households in 2018. Everything will be "smart": smart airports, smart hospitals, smart cars, smart cities, etc. In this seminar we want to deal with different aspects of IT security starting with IoT Devices up to complex "smart" infrastructures. The aim is to gain an understanding of the current situation, the associated challenges and consequences of using IoT devices. For this purpose, various aspects are considered grouped into IT-Security and IoT related areas.


Seminar Cyber Defense

  • B.Sc., M.Sc.
  • Autumn terms: 2020 and 2019
  • Organizer and supervisor of various topics
  • Description: Due to the digitalization and continuous networking of various systems, the network today is a complex infrastructure. Various technologies, protocols and standards are used, which are preferred depending on the field of application and the hardware used. Since we are always on the move digitally, more and more information is on the move digitally, which can be invaluable for attackers. In other words, digitalization and networking not only bring advantages but also disadvantages! "If attackers have enough motive and method, no system is invulnerable. Even if the chance is almost zero, a combination of motive and method can still be too high to withstand an attack. The US-Israeli violation of Iran's nuclear program was an example, as the documentary Zero Hours 2016 showed. Insider agents with physical access to Iranian systems were needed to ensure their high security. Despite the small chances, the attackers had a sophisticated methodology and the overriding motive to prevent Iran from developing nuclear weapons." (https://citysecuritymagazine.com/cyber-security/advice-cyber-security/, accessed 10.09.19) Therefore, in this seminar we want to deal with the most different aspects in the area of Cyber Defence, which run through different research areas (e.g. Moving Target Defence, IoT, Machine Learning, IoT, Social Networks and Bots). The aim is to get a current picture of the Cyber Security situation!


Special Events

  • BA/MA Market Place in December 2019
  • BA/MA Market Place in June 2019
  • "Von der Idee zum Programm", Technische Universität München Ferienprogramm - Mädchen machen Technik, summer 2019


Visiting researcher in the period 2014-2018 during employment in Zurich.