Threat to Security  Steps in Attack and Security Basics  Types of Attack (Active and Passive Attack)  Dos, DDos, Backdoor, Sniffing  Spoofing, Man in the Middle, TCP/IP hacking, Phishing  SQL Injection, Malicious Codes  Password Selection  Caesar Cipher  Caesar Cipher Encryption Practical  Caesar Cipher Decryption Practical  Playfair cipher  Playfair Cipher C Implementation  Hill Cipher  Vigenere Cipher  One Time Pad  Vernam Cipher  Rail Fence  Stegnography  Hashing  SHA 1  Various windows network command