Video-Server > Vorlesungen > Network Security

Network Security


Camera Anja Michaela Kaiser
by Dr.-Ing. Andreas Reinhardt

in summer semester 2015

Course number: S 1245

Einführung in gängige Terminologien im Bereich der IT-Sicherheit.

Kurze Wiederholung relevanter Konzepte der Rechnerkommunikation und Einführung von Hilfsmitteln zur Analyse von Netzwerk-Verkehr.

Grundlagen und Einsatzbereiche kryptografischer Protokolle (symmetrische und asymmetrische Kryptografie, Hash-Funktionen, Signaturen, Schlüsselaustausch) sowie deren praktischer Einsatz.

Entwurf von Rechnernetz-Topologien (unter Einsatz von Proxy-Servern, Firewalls, VPN, DMZ) zum Schutz sensibler Daten gegen unbefugten Zugriff.

Verfahrung zum Erreichen von Netzwerksicherheit und zum Schutz der Privatsphäre in neuartigen Internet-Anwendungen am Beispiel partizipativer Sensoranwendungen.

Additional information about the lecture:
Institut für Informatik or in the directory of lectures

37 Views

Lectures


Introduction; Hacking ethics, terminology, protection goals

Lecture no. 1
Recording date: 21.Sep.2016 | 2 Views

01:08:50

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Hacking ethics, Terms and definitions, Friends and foes - The main actors and their behavior

Fundamtenals and Symmetric cryptography

Lecture no. 2
Recording date: 21.Sep.2016 | 1 Views

01:25:13

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Fundamtenals, Symmetric cryptography

Symmetric and asymmetric cryptography

Lecture no. 3
Recording date: 21.Sep.2016 | 8 Views

01:18:06

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
AES (Advanced Encryption Standart) , Hash Functions, MD5, Publik Key Cryptography

Public key cryptography

Lecture no. 4
Recording date: 21.Sep.2016 | 6 Views

01:22:02

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Asymetric Cryptography, Comparation asymmetric and symmetric, Mathematics and notations primer, Diffie Hellman, RSA

Computer networks revisited

Lecture no. 5
Recording date: 21.Sep.2016 | 3 Views

01:28:30

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Refresh the foundations of computer networking, Tasks and specifics of each layer

Application-level security

Lecture no. 6
Recording date: 21.Sep.2016 | 3 Views

01:04:57

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Internet layering meets security layering, Application-level security

Transport layer security

Lecture no. 7
Recording date: 21.Sep.2016 | 8 Views

01:24:48

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Transport layer security, Secure Sockets Layer (SSL), The Secure Shell (SSH)

Network layer security (and a glimpse at the link layer)

Lecture no. 8
Recording date: 21.Sep.2016 | 2 Views

01:33:56

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Security on the network layer, Separate traffic flows on the data link layer

Link layer security

Lecture no. 9
Recording date: 21.Sep.2016 | 2 Views

01:32:12

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Wired link layer technology, Wireless link layer technology

Firewalls

Lecture no. 10
Recording date: 21.Sep.2016 | 2 Views

01:32:48

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Firewalls, Types of firewalls and services

A primer on user privacy

Lecture no. 11
Recording date: 21.Sep.2016 | 0 Views

01:18:05

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
User privacy in a networked world, Solutions for privacy protection in networked systems

Information about the player

Please activate javascript in order to playback the recordings.


Impressum · Kontakt© TU Clausthal 2017