1. Introduction to Cybersecurity
a. Principles of Cybersecurity
b. Threats, Attacks, and Vulnerabilities
c. Security Services and Mechanisms
2. Information Protection Principles
a. Information encryption. Types of encryption.
b. Symmetric and asymmetric cryptography
c. Digital signature and certificates
d. Cryptocurrencies. Bitcoin, blockchain, etc.
3. Security in the transmission of information.
a. Secure communications protocols. HTTPS and Virtual Private Networks (VPNs)
b. Secure email
4. Cryptosecurity Management and Administration.
a. Information Security Management Systems. ISO/IEC 27000 family
b. Risk Analysis and Management
c. Business continuity plans
5. Legal Aspects of Data Protection.
a. The General Data Protection Regulation (GDPR)
b. Control Authorities
c. Data Protection Officer