1. Introduction 2. Conventioanl Encryption Classical techniques3. Conventional Encryption :Modern techniques4. Conventional encryption :Algorythm5. Confidentiality using conventional encryption6. Public_Key cryptography 7. Introduction to number theory8. Message Authentivation and hash function9. Hash and MAC algorythm10. Digital signatures and authentication protocols11. Authentication application12. Electronic mail security13. IP security14. Web security15. intruders and viruses and worms16. FirewallsAppendix A: projects for teaching cryptography and network security