Introduction to security, fundamental terminology, approaches to information secrecy, steganography and cryptography, overview of the evolution of encryption.
Monitoring, scanning and analysis of network traffic from a security perspective. Google hacking and finding traffic fingerprints.
Hashing functions, principles and properties, modern symmetric and asymmetric ciphers, Quantum and post-quantum cryptography.
Management and distribution of keys, purpose of certificates, digital signature, public key infrastructure, tools for generating certificates and keys, certification authority, revocation of certificates.
Secure remote access management, remote access protocols, security mechanisms, secure file transfer.
IPsec, SSL/TLS, network and transport layer security, virtual private networks.
Communication security at the local, national and international level, personal data protection, cybercrime, the legal context of cyber security and behavior in cyberspace.
Security of mobile and radio networks, security of the Internet of Things concept.
Systems for autonomous monitoring in computer networks - deployment, rules, options, demilitarized zones, traffic monitoring.
Firewalls - division, functions, examples, configuration, options.
Systems for network penetration and performance testing.
Multimedia security - audio, video, IM security - monitoring, eavesdropping, steganography.
Honeypots and honeynets - description, properties and possibilities of use, configuration, methods of deployment, information on the course of the test.
Monitoring, scanning and analysis of network traffic from a security perspective. Google hacking and finding traffic fingerprints.
Hashing functions, principles and properties, modern symmetric and asymmetric ciphers, Quantum and post-quantum cryptography.
Management and distribution of keys, purpose of certificates, digital signature, public key infrastructure, tools for generating certificates and keys, certification authority, revocation of certificates.
Secure remote access management, remote access protocols, security mechanisms, secure file transfer.
IPsec, SSL/TLS, network and transport layer security, virtual private networks.
Communication security at the local, national and international level, personal data protection, cybercrime, the legal context of cyber security and behavior in cyberspace.
Security of mobile and radio networks, security of the Internet of Things concept.
Systems for autonomous monitoring in computer networks - deployment, rules, options, demilitarized zones, traffic monitoring.
Firewalls - division, functions, examples, configuration, options.
Systems for network penetration and performance testing.
Multimedia security - audio, video, IM security - monitoring, eavesdropping, steganography.
Honeypots and honeynets - description, properties and possibilities of use, configuration, methods of deployment, information on the course of the test.