- Symmetric/ asymmetric keys
- Concurrency
- Protocol Security
Syllabus Category: Cyber Security
Security Threats and Vulnerabilities
- Threats and Vulnerabilities
- Loopholes
Ethical Hacking Basics
Hacking Techniques
Operating Systems
- Linux Basics
- LAN
- WAN
- Working of the www and Internet
Information Security Concepts
- IS Services
- Attacks
- E-commerce
- Cyber forensics
Introduction to Cyber Security
- Introductory classes
- Importance
- Applications
- Malicious Codes and Terminologies
- Cyber Security Breaches