Network Protocol Attacks (Sniffing/Spoofing, TCP Attacks, DNS attacks, firewalls, and IDS)
Cryptography basics (Public key and private key algorithms)
Using Cryptography to achieve secure communication (Key distribution and management, Virtual Private Network, Public Key Infrastructure, Transport Layer Security)
Tools for ethical hacking