1. Mathematical background 1.1. Number theory 1.2. Modular arithmetic 1.3. Computation of multiplicative inverses 1.4. Discrete logarithm 1.5. Galois fields 2. Cryptography 2.1. Introduction 2.2. Classic encryption methods and cryptanalysis 2.3. Symmetric cryptosystems. 2.4. Hash functions and MAC 2.5. Asymmetric cryptosystems. 2.6. Key generation and distribution. 2.7. Digital signature. 2.8. Public Key Infrastructure 3. User authentication 4. Introduction to information security 4.1. Threats and vulnerabilities 4.2. Security measures and mechanisms