1. Introduction to security of computer networks
2-3. Introduction to computer networks
4. Information Security Management System (ISMS)
5. Case study of ISMS
6. Identity management
7. Authentication and authorization methods
8. Techniques used by malware
9. Data backup, disk cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Computer attack – common methods
2-3. Introduction to computer networks
4. Information Security Management System (ISMS)
5. Case study of ISMS
6. Identity management
7. Authentication and authorization methods
8. Techniques used by malware
9. Data backup, disk cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Computer attack – common methods