Introduction
- Application - Line Configuration
- Physical layer
- Services and Mechanisms
- Network Security
- Model
Symmetric Ciphers
- Substitution &Transposition Techniques
- Block Cipher
- Triple DES
- Stream Ciphers
Authentication
- Authentication Requirements
- Message Authentication Codes
- Hashes
- Kerberos
- User Authentication: Password, Certificate based & Biometric Authentication
Network Security
- Firewalls
- IP Security
- VPN
- Intrusion Detection
- Web Security
- SSL