Computer security and information security. <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p>
- Basic design principles: Secrecy. Privacy, Integrity, Authenticity
- Background in Cryptology
- Protocols for Entrance Control <o:p></o:p>
- One Time Passwords<o:p></o:p>
- Challenge-Response protocols. <o:p></o:p>
- EKE<o:p></o:p>
- OS Security and Access Control
- Linux Security and Access Control Models
- Secure Coding, Trusted Computing, Disk Encryption
- Protection in communication networks<o:p></o:p>
- Viruses and worms
- Firewalls<o:p></o:p>
- IP security
- Intrusion Detection<o:p></o:p>
- Wireless LAN security