1 |
- |
Computer Communications |
- |
2 |
- |
OSI Model and Protocol Concept |
- |
3 |
- |
TCP/IP Protocol and Port Concept |
- |
4 |
- |
IP Protocol |
- |
5 |
- |
ARP Listening |
- |
6 |
- |
Coding Techniques and Hash Functions |
- |
7 |
- |
Key Based Encryption |
- |
8 |
- |
MID-TERM EXAM |
- |
9 |
- |
Attack and Exploitation Methods |
- |
10 |
- |
Network Control and Monitoring Tools |
- |
11 |
- |
Corporate Network Security and Risk Management |
- |
12 |
- |
Cyber Security and Cyber Incident Response |
- |
13 |
- |
Penetration Tests |
- |
14 |
- |
Information Security Management System Standard |
- |
15 |
- |
Information Technology Law and Deep Web |
- |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |