1. Introduction to security, history of network security, development and modern trends in security.
2. Distribution of modern ciphers - symmetric / asymmetric, block / stream, cipher modes, key distribution options - DH.
3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerabilities, implementation, use.
4. PKI - certificates, PGP, X.509, elliptic curves, digital signature.
5. SSL / TLS libraries - configurations and designs over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates.
6. SSH - version, description, advanced configuration - file exchange, traffic tunneling.
7. VPN - principle, TUN / TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard.
8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, signature-based traffic analysis, advanced behavioral analysis from NetFlow.
9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE.
10. Authentication, multifactor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on (SSO) systems.
11. Selected parts of biometric authentication.
12. Interferometry, Raman, Brillouin and Rayleigh scattering and the use of fiber optic sensors in security applications.
13. Principles of key distribution using physical principles of quantum mechanics (QKD), protocols QKD - BB84, SARG04 and E91, QKD in quantum networks.
14. Introduction to penetration and performance testing - security auditing, testing methodologies and security analysis and certification - Common Criteria, JISE, FIPS, EAL.
2. Distribution of modern ciphers - symmetric / asymmetric, block / stream, cipher modes, key distribution options - DH.
3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerabilities, implementation, use.
4. PKI - certificates, PGP, X.509, elliptic curves, digital signature.
5. SSL / TLS libraries - configurations and designs over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates.
6. SSH - version, description, advanced configuration - file exchange, traffic tunneling.
7. VPN - principle, TUN / TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard.
8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, signature-based traffic analysis, advanced behavioral analysis from NetFlow.
9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE.
10. Authentication, multifactor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on (SSO) systems.
11. Selected parts of biometric authentication.
12. Interferometry, Raman, Brillouin and Rayleigh scattering and the use of fiber optic sensors in security applications.
13. Principles of key distribution using physical principles of quantum mechanics (QKD), protocols QKD - BB84, SARG04 and E91, QKD in quantum networks.
14. Introduction to penetration and performance testing - security auditing, testing methodologies and security analysis and certification - Common Criteria, JISE, FIPS, EAL.