Basic concepts and traditional encryption methods
Block and stream ciphers with shared keys
Public and private key cryptography
Hashing techniques and data authenticity
Methods to verify identity and access control
Viruses, worms, Trojan horses, and malware
Securing networks and managing digital certificates