Overview of computer networks -- Mathematical foundations for computer networks -- Overview of cryptography -- Mathematical foundations for cryptography -- Classical cipher schemes -- Modern symmetric ciphers -- Public-key cryptography for data confidentiality -- Authentication schemes -- Centralized authentication service -- Public key infrastructure (PKI) -- Pretty Good Privacy -- Internet security services -- System security -- Security of emerging technology.