Video-Server > Vorlesungen > Network Security

Network Security


Camera Anja Michaela Kaiser

Information about the player

Please activate javascript in order to play the recordings on this website. For the Internet Explorer the current version of the Adobe Flash Player is needed. The Internet Explorer is only supported in version 11. The playback with the Internet Exporer is not possible in Windows 8 or higher.

by Dr.-Ing. Andreas Reinhardt

in summer semester 2015

Course number: S 1245

Einführung in gängige Terminologien im Bereich der IT-Sicherheit.

Kurze Wiederholung relevanter Konzepte der Rechnerkommunikation und Einführung von Hilfsmitteln zur Analyse von Netzwerk-Verkehr.

Grundlagen und Einsatzbereiche kryptografischer Protokolle (symmetrische und asymmetrische Kryptografie, Hash-Funktionen, Signaturen, Schlüsselaustausch) sowie deren praktischer Einsatz.

Entwurf von Rechnernetz-Topologien (unter Einsatz von Proxy-Servern, Firewalls, VPN, DMZ) zum Schutz sensibler Daten gegen unbefugten Zugriff.

Verfahrung zum Erreichen von Netzwerksicherheit und zum Schutz der Privatsphäre in neuartigen Internet-Anwendungen am Beispiel partizipativer Sensoranwendungen.

Additional information about the lecture:
Institut für Informatik or in the directory of lectures

164 Views

Lectures


Introduction; Hacking ethics, terminology, protection goals

Lecture no. 1

01:08 hrs21.Sep.20163 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Hacking ethics, Terms and definitions, Friends and foes - The main actors and their behavior

Fundamtenals and Symmetric cryptography

Lecture no. 2

01:25 hrs21.Sep.20162 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Fundamtenals, Symmetric cryptography

Symmetric and asymmetric cryptography

Lecture no. 3

01:18 hrs21.Sep.201623 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
AES (Advanced Encryption Standart) , Hash Functions, MD5, Publik Key Cryptography

Public key cryptography

Lecture no. 4

01:22 hrs21.Sep.201616 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Asymetric Cryptography, Comparation asymmetric and s
ymmetric, Mathematics and notations primer, Diffie Hellman, RSA

Computer networks revisited

Lecture no. 5

01:28 hrs21.Sep.201619 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Refresh the foundations of computer networking, Tasks and specifics of each layer

Application-level security

Lecture no. 6

01:04 hrs21.Sep.201610 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Internet layering meets security layering, Application-level security

Transport layer security

Lecture no. 7

01:24 hrs21.Sep.201617 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Transport layer security, Secure Sockets Layer (SSL), The Secure Shell (SSH)

Network layer security (and a glimpse at the link layer)

Lecture no. 8

01:33 hrs21.Sep.201614 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Security on the network layer, Separate traffic flows on the data link layer

Link layer security

Lecture no. 9

01:32 hrs21.Sep.201621 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Wired link layer technology, Wireless link layer technology

Firewalls

Lecture no. 10

01:32 hrs21.Sep.201623 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Firewalls, Types of firewalls and services

A primer on user privacy

Lecture no. 11

01:18 hrs21.Sep.201616 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
User privacy in a networked world, Solutions for privacy protection in networked systems


Impressum · Kontakt© TU Clausthal 2017