We will cover the following topics:
- InformationSecurity fundamentals.
- Attackers and their attacks.
- Basicfundamentals of symmetric and asymmetric cryptography
- Hash Functions and Digital Signature
- AccessControl Methods
- Overviewof Firewalls & Intrusion Detection Systems
- PerformingVulnerabilities Assessment and Risk management (definition, components, etc)
- Overviewof business continuity & disaster recovery (redundancy planning, data backups, disaster exercises, etc)