Week | Section 002 (Wed) |
Section 004 |
Topics |
---|---|---|---|
1 | Jan 20 | Jan 26 | Introduction to the Course Threat Modeling |
2 | Jan 27 | Feb 1 | Risk Assessment Information Privacy |
3 | Feb 3 | Feb 8 | Introduction to Linux and Google Cloud Platform Information Security in Organizations |
4 | Feb 10 | Feb 15 | Introduction to Cryptography Symmetric Cryptography |
5 | Feb 17 | Feb 22 | Asymmetric Cryptography Digital Certificates and Public Key Infrastructures |
6 | Feb 24 | Mar 1 | Authentication and Passwords Password Cracking |
7 | Mar 3 | Mar 8 | Guest Speaker |
8 | Mar 10 | Mar 15 | Introduction to Networking Vulnerability Scanning |
9 | Mar 17 | Mar 22 | Vulnerability Exploitation |
10 | Mar 31 | Mar 29 | Physical Security Human Elements of Security |
11 | Apr 7 | Apr 5 | Network Security Monitoring Incident Response |
12 | Apr 14 | Apr 12 | Response Case Study – Equifax Malware Analysis |
13 | Apr 21 | Apr 19 | Recovery Case Study – Maersk |