Concepts
Numbers generation
Symmetric encryption algorithms (128/256 bits is considered safe)
Asymmetric encryption algorithms
Hashing
Prevent MITM:
TLS handshake.
Key Exchange
MAC
Cryptographic Weaknesses
Certificate lifecycle
Revocation of certificates
Attacks against cryptosystems:
TLS
Brute force
TLS vulnerabilities