1. Introduction to the problem area
2. Malware
3. Introduction to computer networks
4. Design of computer network from safety point of view
5. Methods of gathering information about network
6. Protecting data
7. Authentication methods
8. Personal data protection – IT point of view
9. Human – largest security treat
10. Safety politics of IT in organization
11. Case studies of safety politics
12. Case studies of basic safety programs usage
2. Malware
3. Introduction to computer networks
4. Design of computer network from safety point of view
5. Methods of gathering information about network
6. Protecting data
7. Authentication methods
8. Personal data protection – IT point of view
9. Human – largest security treat
10. Safety politics of IT in organization
11. Case studies of safety politics
12. Case studies of basic safety programs usage