| Topic | PDF, 1 slide/page | PDF, 2 slides/page |
|---|---|---|
| Introduction | 1 | 2 |
| Review of networks | 1 | 2 |
| Introduction to cryptography (Ch. 2) | 1 | 2 |
| Secret-key cryptography (Ch. 3) | 1 | 2 |
| Hashes (Ch. 4) | 1 | 2 |
| Public-key cryptography (Ch. 5) | 1 | 2 |
| Number theory (Ch. 6) | 1 | 2 |
| Authentication (Ch. 7) | 1 | 2 |
| Authentication of people | 1 | 2 |
| Security handshake pitfalls | 1 | 2 |
| Kerberos 4 | 1 | 2 |
| Kerberos 5 | 1 | 2 |
| OS security | 1 | -- |
| IP security | 1 | 2 |
| Email security | 1 | 2 |
| Transport-layer and web security | 1 | 2 |