Outline of the Tutorial
• Security attacks and services
• Cryptography: basic concepts
• Private key cryptography
• Public key cryptography
• Network security principles in use
• Penetration testing and ethical hacking
• Security attacks and services
• Cryptography: basic concepts
• Private key cryptography
• Public key cryptography
• Network security principles in use
• Penetration testing and ethical hacking
No comments:
Post a Comment