Topic | Tasks | Further Information |
---|---|---|
Introduction | Preparation for exercises | |
Symmetric cryptography | Exercise 2 | Files needed |
Asymmetric cryptography | Exercise 3 | |
PKI | Exercise 4 | Exercise_4.zip |
TLS | Exercise 5 | Exercise_5.zip |
TCP/IP Tools + Attacks | Exercise 6 | Files needed |
Firewalls | Exercise 7 | Solution proposal |