Introduction; Information Security Policy,Standards, and Practices; The Information Security Blue Print; Contingency plan and a model for contingency plan
Introduction; Physical design; Firewalls; Protecting Remote Connections
Introduction; Intrusion Detection Systems (IDS); Honey Pots, Honey Nets, and Padded cell systems; Scanning and Analysis Tools
Introduction; A short History of Cryptography; Principles of Cryptography; Cryptography Tools; Attacks on Cryptosystems.
Attacks,services, and Mechanisms; Security Attacks; Security Services; A model for Internetwork Security; Internet Standards and RFCs Kerberos, X.509 Directory Authentication Service.
Pretty Good Privacy (PGP); S/MIME
IP Security Overview; IP Security Architecture; Authentication Header; Encapsulating Security Payload; Combining Security Associations;Key Management.
Web security requirements; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET)