Week |
Thursday |
Topics |
1 |
Jan 13 |
Introduction Threat Modeling |
2 |
Jan 20 |
Risk Assessment Information Privacy |
3 |
Jan 27 |
Introduction to Linux and Google Cloud Platform Introduction to Cryptography |
4 |
Feb 3 |
Symmetric Cryptography Hashing |
5 |
Feb 10 |
Asymmetric Cryptography Digital Certificates and Public Key Infrastructures |
6 |
Feb 17 |
Authentication and Passwords Password Cracking |
7 |
Feb 24 |
Mid-Term Review
|
|
Mar 3 |
Spring Break |
8 |
Mar 10 |
Password Cracking Vulnerability Scanning |
9 |
Mar 17 |
Vulnerability Exploitation |
10 |
Mar 24 |
Vulnerability Exploitation Social Engineering |
11 |
Mar 31 |
Physical Security |
12 |
Apr 7 |
Malware Analysis Network Security Monitoring |
13 |
Apr 14 |
Incident Response and Recovery |
14 |
Apr 21 |
Incident Recovery Final Review |