[... return to main page]

The following are some outline study areas:

  1. Understands the operation of a shifted-alphabet/code shifting encryption.
  2. Understands the range of asymmetric encryption algorithms.
  3. Understands the operation of Vigenere encryption algorithms.
  4. Understands how many encryption keys map to the number of bits in the key.
  5. Calculates the time to crack a code using brute force, and given specifications.
  6. Calculates the time to crack a code using brute force, with increasing computing power.
  7. Understands the difference between stream and block encryption.
  8. Understands the decryption process in public-key encryption.
  9. Understands the usage of private keys in authentication.
  10. Understands how the recipient authenticates the sender.
  11. Understands the main parameters of a digital certificate.
  12. Understands the applications which are signed by certificates.
  13. Understands the operation of the MD5 signature.
  14. Understands the hash conversion to Base-64.
  15. Understands key entropy.
  16. Calculates the exchange parameters for the Diffie-Hellman method.
  17. Understands the operation of Diffie-Hellman.
  18. Understands the concept of port scanning.
  19. Understands the concept of host scanning.
  20. Understands Snort rules for destination ports.
  21. Understands Snort rules for source ports.
  22. Understands the direction of TCP ports.
  23. Understands how an agent-based system can detect threats.
  24. Understands the usage of client TCP ports.
  25. Understands the significance of the three-way handshake for a client-server connection.
  26. Understand the usage of the three-way handshake for detection of events.
  27. Understand the usage of TCP flags.
  28. Understands Labs 1-7.

Overall approx 40 academic questions.