Week | Tue |
Thur |
Topics |
---|---|---|---|
1 | Jan 11 | Jan 13 |
Introduction / Threat Modeling |
2 | Jan 18 | Jan 20 |
Risk Assessment / Information Privacy |
3 | Jan 25 | Jan 27 |
Introduction to Linux and Google Cloud Platform / Introduction to Cryptography |
4 | Feb 1 | Feb 3 |
Symmetric Cryptography / Hashing |
5 | Feb 8 | Feb 10 |
Asymmetric Cryptography / Digital Certificates and Public Key Infrastructures |
6 | Feb 15 | Feb 17 |
Authentication and Passwords / Password Cracking |
7 | Feb 22 | Feb 24 | Mid-Term Review / Guest Speaker |
8 | Mar 8 | Mar 10 | Password Cracking / Vulnerability Scanning |
9 | Mar 15 | Mar 17 | Vulnerability Exploitation |
10 | Mar 22 | Mar 24 |
Vulnerability Exploitation / Social Engineering |
11 | Mar 29 | Mar 31 |
Physical Security |
12 | Apr 5 | Apr 7 | Malware Analysis / Network Security Monitoring |
13 | Apr 12 | Apr 14 | Incident Response and Recovery |
14 | Apr 19 | Apr 21 | Incident Recovery / Final Review |