1. Introduction to Information Security and Digital Threats (One meeting*)
  2. One way and trapdoor functions (One meeting)
  3. Pseudo Random Number Generators (One meeting)
  4. Block Ciphers (Two meetings)
  5. Cipher Attacks and The Birthday Problem (One meeting)
  6. Hash Functions (Two meetings)
  7. Private Key Encryption (One meeting)
  8. Public Key Encryption (One meeting)
  9. Message Authentication (One meeting)
  10. Digital Signatures (One meeting)
  11. Protocols & Key Distribution (One meeting)
  12. Steganography (One meeting)
  13. Cryptographic Engineering and FPGA applications (One meeting)

 * Each meeting is a two-hour meeting for a total of 26 hours