Topic | Tasks | Further Information |
---|---|---|
Introduction | Preparation for exercises | |
Symmetric cryptography | Exercise 2 | Files needed |
Asymmetric cryptography | Exercise 3 | |
Key management (PKI) | Exercise 4 | |
Transport Layer Security (TLS) | Exercise 5 | Solution |
TCP/IP Tools + Attacks | Exercise 6 | |
Firewalls (Perimeter security...) | Exercise 7 | Solution |