Part 1 Why cryptography is important: cryptographic basic -definitions, benefits, strong vs. weak cryptography; how cryptography works - symmetric key, public key, key sharing, digital signature etc; key management - public key infrastructure, passphrases, key servers, revocing keys; legal considerations -cryptographic laws, legal history, patents, current changes; the current players - the US government, network associates, Couterpane etc.; cryptographic applications - Kerberos, Pretty Good Privacy, MD5, Tripwire and L5, VPN, Secure Sockets Layer, and Secure Shell. Part 2 What is Secure Shell?: the Secure Shell application - encryption and types of encryption, X authentication, how it works; the "s" applications versus the "r" applications - the Berkeley "r" commands, the "s" (secure) commands. Part 3 Obtaining Secure Shell: obtaining freeware Secure Shell - UNIX, Windows 95, Windows 98 and Windows NT; obtaining F-Secure Secure Shell - Macintosh, VAX/VMS and OS/2. Part 4 Using Secure Shell: Secure Shell server - the Secure Shell Daemon (sshd), making Secure Shell known hosts, log files, system files; Secure Shell client - user files, Secure Shell authentication agent, Secure Shell identity adder, Secure Shell RSA key generation, remote logon, remote copying.