Case study on how the TLS and Kerberos protocols work. And how to use them. At least use TLS. Kerberos is a bit too much.