Skip to content
Advanced Computer Networks & Computer Systems Security
- Firewall
- IDS/IPS
- Honeypots
- Authentication and authorization
Network Vulnerability Exploitation and Defense
- Vulnerabilities in network protocols
- DOS attack
- Firewalls
- IP Security
Data Communication Networks & Security
- SSL Security
- VPN
- Proxy servers
Introduction to wireless networks
- Wireless protocols
- Wireless Application Protocol Overview
Wireless Network Security
- IEEE 802.11 Wireless LAN security
- Wireless End to End security
Routing Protocols