Hasso-Plattner-Institut
 
    • de
 

Lecture/course - english - Winter 2003/2004

The lecture course "Internet Security I" gives a detailed introduction into Internet Technology. It explains the function mode and architecture of Internets and Intranets and discusses important Internet protocols like IP, TCP, UDP, ICMP, as well as Internet addressing and DNS. Moreover, the Internet Protocol Next Generation - IPv6 - will be introduced. Furthermore important Internet services like WWW, email, ftp, telnet, rsh and more will be treated. Encryptions standards like IPSec show possibilities for information security. New techniques like LDAP and Multimedia applications will complete this lecture about Internet Technology. The lecture course provides the basic understanding for a discussion of security weaknesses of Internet and Intranets and possible targets for attacks over the Internet which will be treated in the lecture course "Internet Security II - Weaknesses and Target".

Authors

Prof. Dr. Christoph Meinel

Relevant Links

  • Homepage
  • Informatik Trier
  • Universität Trier

Duration

19:20 hours

0 Internet Bridge Trier-Beijing

Internet
Security I

Internet Security I - Internet Technology
General Introduction

00:38:44 hours | play >

1 Introduction

1 Internet Security - An Overview

Internet
Security I-1

(1) Nowaday's Internet
(2) Risks for Interconnenected Information Systems
(3) Direction of Internet Security
(4) Computer Crimes and Damage
(5) Cryptography
(6) Encryption in Practise

01:32:01 hours | play >

2 First Understanding of Internet and WWW

Internet
Security I-2

(1) Introduction
(2) Internet and Protocols
(3) Internet Services and Applications
(4) WWW-World Wide Web
(5) WWW-Browser and WWW-Server
(6) History of Internet and WWW
(7) Who-is-Who in Internet and WWW
(8) Internet Standards

01:28:00 hours | play >

2 Internet Technology

1 Basic Concepts of Computer Networks

Internet
Security I-3

(1) Communication
(2) Computer Communication
(3) Computer Networks
(4) Packet Switching
(5) Communication Protocols
(6) ISO/OSI Layering Model
(7) TCP/IP Layering Model

01:22:51 hours | play >

2 LAN - Technologies

Internet
Security I-4

(1) Point-to-Point Connections
(2) Importance of LANs
(3) Local Addresses
(4) LAN-Topologies
(5) Ethernet-Example for Bus Topology
(6) Token-Ring - First Example for Ring Topology
(7) FDDI - Second Example for Ring Topology
(8) ATM - First Example of a Star Topology
(9) WLAN - Second Example of a Star Topology
(10) Hardware-Addressing
(11) Network Inferface Card
(12) Packet Hearder and Packet Formats
(13) LAN-Enlargement

01:23:56 hours | play >

3 WAN - Technologies

Internet
Security I-5

(1) Introduction
(2) Structure of a WAN
(3) Packet Switching
(4) Addressing
(5) Next-Hop-Routing
(6) Routing Tables
(7) Routing Algorithms
(8) Examples of WAN-Technologies

01:01:38 hours | play >

4 Internetworking (I)

Internet
Security I-6

(1) Introduction
(2) Internets-Virtual Networks
(3) Internets Protocol Suite TCP/IP
(4) IP-Addressing
(5) IP-Addressing Resolution
(6) IP-Datagrams
(7) IP-Datagram Service
(8) IP-Encapsulation and IP-Fragmentation
(9) ICMP-Protocol

01:28:23 hours | play >

4 Internetworking (II)

Internet
Security I-2

(1) Content-Intertnetworking 1
(2) TCP-A Reliable Transport Service
(3) TCP Retransmission
(4) TCP-Flow and Congestion Control
(5) TCP 3-Way-Handshake
(6) TCP-Ports
(7) TCP-Segments
(8) TCP Application Programming Interface
(9) UDP

00:57:24 hours | play >

5 IPv6 - Internet Protocol Next Generation

Internet
Security I-7

(1) Introduction
(2) Address Format
(3) Header Format
(4) Security Concept: IPSec-Standard
(5) Migration from IPv4 to IPv6

01:06:31 hours | play >

3 Internet Services

1 Basic Notions

Internet
Security I-8

(1) Introduction
(2) Internet Services and Applications
(3) Client/Server Interaction
(4) Ports
(5) Threads
(6) Complex Client/Server Relations
(7) Socket-API

00:45:01 hours | play >

2 Naming and Directory Service

Internet
Security I-9

(1) Introduction
(2) History
(3) DNS
(4) DNS-System
(5) DNS-Client/Server Interachtion
(6) Caching and Backup in DNS
(7) Idea of a Directory Service
(8) X.500
(9) X.500 Information Model
(10) X.500 Certificates and LDAP
(11) Internet-Protocol LDAP
(12) Securtiy of LDAP by SSL

01:08:21 hours | play >

3 E-Mail

Internet
Security I-2

(1) Introduction
(2) Message Handling System
(3) Basic Function of an E-Mail System
(4) E-Mail System
(5) E-Mail Format
(6) SMTP
(7) MIME, PEM and S/MIME
(8) PGP

00:59:17 hours | play >

4 File Transfer

Internet
Security I-1

(1) Introduction
(2) FTP
(3) FTP - Functional Principle
(4) Active and Passive FTP
(5) FTP Commands and Anonymous FTP
(6) TFTP

00:47:42 hours | play >

5 Remote Login

Internet
Security I-3

(1) Introduction
(2) Most Popular Remote Login Service
(3) Telnet
(4) Telnet-Session
(5) rlogin
(6) rsh and ssh

00:43:21 hours | play >

6 Network Management

Internet
Security I-10

(1) Network Management Function
(2) TCP/IP Network Management Software
(3) SNMP
(4) SNMPv3

00:29:47 hours | play >

7 Audio and Video Communication

Internet
Security I-11

(1) Real-Time Application in Internet
(2) Requirements of Real-Time Applications
(3) Playback Buffer
(4) RTP,RTCP and RTSP
(5) Media Player
(6) SMIL
(7) Resource Reservation and Quality of Service

00:54:12 hours | play >

4 Web Technology

1 World Wide Web

Internet
Security I-12

(1) Introduction
(2) URI
(3) URN
(4) URL
(5) HTTP
(6) Basic Properties of HTTP
(7) HTTP Message Format
(8) Content Negotiation
(9) Authentication
(10) Persistent Connections
(11) Caching
(12) Coockies
(13) Future Developements on HTTP
(11) HTML

01:27:07 hours | play >

2 Scripts and CGI-Programming

Internet
Security I-6

(1) Introduction
(2) Script Languages
(3) Programming Languages Java
(4) Distributed Programming
(5) Web Server Configuration
(6) CGI - Common Gateway Interface

01:05:47 hours | play >