Threat to Security Steps in Attack and Security Basics Types of Attack (Active and Passive Attack) Dos, DDos, Backdoor, Sniffing Spoofing, Man in the Middle, TCP/IP hacking, Phishing SQL Injection, Malicious Codes Password Selection Caesar Cipher Caesar Cipher Encryption Practical Caesar Cipher Decryption Practical Playfair cipher Playfair Cipher C Implementation Hill Cipher Vigenere Cipher One Time Pad Vernam Cipher Rail Fence Stegnography Hashing SHA 1 Various windows network command