Information security
Symmetric encryption
Data integrity
Public key encryption
Digital signatures and PKI
CSPRNG (Cryptographically Secure Pseudo-Random Number Generators)
Authentication
Secret sharing
Access control
Secure protocols (tls, ipsec, ssh)
Firewalls
Network segmentation
Network monitoring
Email security
DNSSEC e BGP security
DoS attacks and countermeasures
Application security