The course begins with a study of classical cryptosystems and the methods used to break them. The major currently used systems, DES, AES and RSA, are then introduced and examined from a design and security perspective. It then reviews how these tools are utilized in the Internet protocols and applications such as SSL/TLS, IPSEC, Kerberos, PGP and others including wireless. They will learn how to identify network security threats.System security issues are also covered, such as viruses, intrusion and firewalls. The design, implementation and configuration of system security for operating systems, databases and servers with attention given to defense and prevention systems, intrusion detection systems and trace-back systems. They will also learn how to select and deploy firewalls and manage VPNs.This module provides students with a solid theoretical and practical foundation for building secure distributed systems. Students will discover how to protect systems against malicious attacks, using technologies (both hardware and software) such as: cryptology, software reliability, VPN, IDS and IPS.