Week |
Tuesday |
Thursday |
Topics |
1 |
Aug 23 |
Aug 25 |
Introduction Threat Modeling |
2 |
Aug 30 |
Sep 1 |
Introduction to Cryptography Symmetric Cryptography |
3 |
Sep 6 |
Sep 8 |
Hashing Asymmetric Cryptography |
4 |
Sep 13 |
Sep 15 |
Digital Certificates and Public Key Infrastructures Introduction to Linux and Google Cloud Platform |
5 |
Sep 20 |
Sep 22 |
Authentication and Passwords Password Cracking |
6 |
Sep 27 |
Sep 29 |
Password Cracking |
7 |
Oct 4 |
Oct 6 |
Vulnerability Scanning Vulnerability Exploitation |
8 |
Oct 11 |
Oct 13 |
Vulnerability Exploitation |
9 |
Oct 18 |
Oct 20 |
Social Engineering |
10 |
Oct 25 |
Oct 27 |
Physical Security Malware Analysis |
11 |
Nov 1 |
Nov 3 |
Network Security Monitoring |
12 |
Nov 8 |
Nov 10 |
Risk Assessment Information Privacy |
13 |
Nov 15 |
Nov 17 |
Incident Response and Recovery |
|
Nov 22 |
Nov 24 |
Thanksgiving Break – No Class |
14 |
Nov 29 |
Dec 1 |
Incident Response and Recovery |