Syllabus | The Classes | Textbooks
Computer security concepts | The OSI activity architecture | Security attacks | Security services | Security mechanisms | Model for network security
Symmetric encryption principles | Symmetric block encryption algorithms | Random and pseudorandom numbers | Stream ciphers and RC4 | Cipher block modes of operation
Approaches to message authentication | Secure hash functions | Digital signatures | Message authentication codes | Public-key cryptography principles | Public-key cryptography algorithms
Mathematics of Crypto
Kerberos
PKI
Web security considerations | Secure sockets layer | HTTPS | Transport layer security | Secure shell (SSH)
IP security overview | IP security policy | Cryptographic suites | Encapsulating security payload | Combining security associations | Internet key exchange
The need for firewalls | Firewall characteristics | Types of firewalls | Firewall basing | Firewall locations and configurations
Botnet