1. Introduction to informatics 1
2. Introduction to information theory
3. Software and its classification
4. Malware
5. Introduction to author law in digital age
6. Cryptography – history and symmetric cryptography
7. Asymmetric cryptography and electronic signature
8. Electronic signature in legislative
9. Secure hashing algorithms
10. Peer – to – peer networks, distributed computing
11. Internet - history, future and protocols
12. Telecommunications – introduction to legislative
13. Future of IT
14. Quick information and safety oriented information systems
2. Introduction to information theory
3. Software and its classification
4. Malware
5. Introduction to author law in digital age
6. Cryptography – history and symmetric cryptography
7. Asymmetric cryptography and electronic signature
8. Electronic signature in legislative
9. Secure hashing algorithms
10. Peer – to – peer networks, distributed computing
11. Internet - history, future and protocols
12. Telecommunications – introduction to legislative
13. Future of IT
14. Quick information and safety oriented information systems