- Ceaser Cipher
- Hill Cipher
- Rail Fence Transposition
- Playfair Cipher
- Vigenere Cipher
- Row Transposition
- Diffe HellMan Key Exchange
- RSA Javascript
- SHA 1
- DES
- AES
- Digital Signature
- Implement IDS in your system and show how intrusion is detected.
- implement and show how to protect your system from Malware using RootkitHunter.
- Implement and show how to protect your system from Malware using BuildingTrojans.
- Implement a Vulnerability Assessment tool N-stalker and show how it protects your system.