1. Develop a basic understanding of cryptography, how it has evolved, and some key encryption techniques used today.
2. Develop an understanding of security policies (such as authentication, integrity and confidentiality), as well as protocols to implement such policies in the form of message exchanges.
3. Develop an understanding of latest viruses, threats, IDS and concepts of firewalls