This document outlines the topics covered in a course on applied IT security and authentication/security protocols. The course covers network and operating system security, applied cryptography including public key infrastructures and encryption standards, software development security, and an overview of authentication protocols like SSL/TLS, IPSec, and those used in wireless technologies like Bluetooth. It discusses how various protocols provide security at the network, transport, and application layers and examines vulnerabilities of protocols like WEP and concerns regarding Bluetooth security.