Cryptography and its applications to ensure privacy.
Information security in advanced technology: Internet of things, cloud computing, virtual machines o Identifying the various methods of security penetration to address them (professional penetration).