1. Introduction -- 2. The TCP/IP protocol suite -- 3. Network attack methods -- 4. The security role of the router -- 5. The role of the firewall -- 6. The role of the virus scanner and encryption -- 7. Host attack methods -- 8. Working with Windows -- 9. The role of the scanner