Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
An overview of cryptography with an emphasis on symmetric ciphers.
A high-level examination of hash functions and an overview of common hash algorithms.
A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP