Lecture Content Overview

  1. Introduction
  2. Technologies
  3. Symmetric Cryptography — Hash functions and AES
  4. Public key cryptography
  5. User authentication
  6. Access control
  7. Database security
  8. Malicious software
  9. Software exploits
  10. Secure web
  11. DoS attacks
  12. Firewalls
  13. Intrusion detection
  14. Cloud and IoT security
  15. IT security
  16. Legal framework
  17. Attack analysis
  18. Cryptocurrency and Quantum Cryptography