IT job market - how to plan the future
Threads in IT systems: sniffing, "is encrypted traffic secure?", social engineering, phishing, etc.
Attacking the identity: key loggers, identity and access management, shoulder surfing, spoofing, attacks to passwords, "what does Internet now about us?"
Golden rules for Internet security
Being in the cloud (development of IT systems from PC-via-VM-Cloud/containers)