CO1: Understand the basics of computer security CO2: Elaborate the cryptographic techniques. CO3: Discuss the transport layer security CO4: Find the pros and cons of various key distribution methods CO5: Analyze the wireless Network security CO6: Find the level of system security