| 1 |
- |
Computer Communications |
- |
| 2 |
- |
OSI Model and Protocol Concept |
- |
| 3 |
- |
TCP/IP Protocol and Port Concept |
- |
| 4 |
- |
IP Protocol |
- |
| 5 |
- |
ARP Listening |
- |
| 6 |
- |
Coding Techniques and Hash Functions |
- |
| 7 |
- |
Key Based Encryption |
- |
| 8 |
- |
Attack and Exploitation Methods |
- |
| 9 |
- |
Network Control and Monitoring Tools |
- |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
- |
Corporate Network Security and Risk Management |
- |
| 12 |
- |
Cyber Security and Cyber Incident Response |
- |
| 13 |
- |
Penetration Tests |
- |
| 14 |
- |
Information Security Management System Standard |
- |
| 15 |
- |
Information Technology Law and Deep Web |
- |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |