Information theoretic security
Computational security
Private key Encryption
Message Authentication Codes
Hash functions
Public key Encryption
Digital Signatures
More advanced topics may be covered if time permits. On successfully passing the course, the student is guaranteed to be knowledgeable on the basic concepts of provable security.