1. Introduction to the course
2-3. Services of modern computer networks
4. Information security management system (ISMS)
5. Use case of ISMS
6. Identity management in computer network
7. Authentication and authorization methods
8. Techniques used by malware
9. backup, disc cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Attack vectors
2-3. Services of modern computer networks
4. Information security management system (ISMS)
5. Use case of ISMS
6. Identity management in computer network
7. Authentication and authorization methods
8. Techniques used by malware
9. backup, disc cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Attack vectors