Symmetric encryption, Stream vs. block ciphers, asymmetric encryption, hash functions, data integrity, message authentication codes, digital signatures, networks and IP security, SPAMs, certificates and public key infrastructure, TLS/SSL.