{"id":22,"date":"2018-01-17T14:36:08","date_gmt":"2018-01-17T19:36:08","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=22"},"modified":"2025-04-08T16:35:11","modified_gmt":"2025-04-08T20:35:11","slug":"schedule","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/","title":{"rendered":"Schedule"},"content":{"rendered":"<table>\n<tbody>\n<tr>\n<td width=\"78\">\n<p>Week<\/p>\n<\/td>\n<td width=\"132\">\n<p>Tuesday<\/p>\n<\/td>\n<td width=\"126\">\n<p>Thursday<\/p>\n<\/td>\n<td width=\"288\">\n<p>Topics<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>1<\/p>\n<\/td>\n<td width=\"132\">\n<p>Jan 14<\/p>\n<\/td>\n<td width=\"126\">\n<p>Jan 16 \u2013 No Class<\/p>\n<\/td>\n<td width=\"288\">\n<p>Introduction<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>2<\/p>\n<\/td>\n<td width=\"132\">\n<p>Jan 21<\/p>\n<\/td>\n<td width=\"126\">\n<p>Jan 23<\/p>\n<\/td>\n<td width=\"288\">\n<p>Threat Modeling<\/p>\n<p>Risk Assessment &amp; Milestone 1 Report Q&amp;A<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"623\">\n<p>Sun, Jan 26 <strong>Milestone 1<\/strong> Risk Assessment Report Due<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>3<\/p>\n<\/td>\n<td width=\"132\">\n<p>Jan 28<\/p>\n<\/td>\n<td width=\"126\">\n<p>Jan 30<\/p>\n<\/td>\n<td width=\"288\">\n<p>Introduction to Linux and Google Cloud Platform<\/p>\n<p>Data Privacy<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>4<\/p>\n<\/td>\n<td width=\"132\">\n<p>Feb 4<\/p>\n<\/td>\n<td width=\"126\">\n<p>Feb 6<\/p>\n<\/td>\n<td width=\"288\">\n<p>Milestone 1 Report Feedback \u2013 Individual Feedback Session \u2013 no class<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>5<\/p>\n<\/td>\n<td width=\"132\">\n<p>Feb 11<\/p>\n<\/td>\n<td width=\"126\">\n<p>Feb 13<\/p>\n<\/td>\n<td width=\"288\">\n<p>Introduction to Cryptography<\/p>\n<p>Symmetric Cryptography &amp; Hashing<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"623\">\n<p>Sun, Feb 16 <strong>Milestone 2<\/strong> Final Risk Assessment Report Due<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>6<\/p>\n<\/td>\n<td width=\"132\">\n<p>Feb 18<\/p>\n<\/td>\n<td width=\"126\">\n<p>Feb 20<\/p>\n<p><strong>(NO CLASS)<\/strong><\/p>\n<\/td>\n<td width=\"288\">\n<p>Asymmetric Cryptography<\/p>\n<p>Digital Certificates and Public Key Infrastructures<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>7<\/p>\n<\/td>\n<td width=\"132\">\n<p>Feb 25<\/p>\n<\/td>\n<td width=\"126\">\n<p>Feb 27<\/p>\n<\/td>\n<td width=\"288\">\n<p>Authentication and Passwords<\/p>\n<p>Password Cracking<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"623\">\n<p>Spring Break March 3 &#8211; March 9 \u2013 No class<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>8<\/p>\n<\/td>\n<td width=\"132\">\n<p>March 11<\/p>\n<\/td>\n<td width=\"126\">\n<p>March 13<\/p>\n<\/td>\n<td width=\"288\">\n<p>Vulnerability Scanning<\/p>\n<p>Vulnerability Exploitation<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>9<\/p>\n<\/td>\n<td width=\"132\">\n<p>March 18<\/p>\n<\/td>\n<td width=\"126\">\n<p>March 20<\/p>\n<\/td>\n<td width=\"288\">\n<p>Milestone 3 Report Q&amp;A<\/p>\n<p>Human Element \u2013 Info. Security in Organizations<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>10<\/p>\n<\/td>\n<td width=\"132\">\n<p>March 25 <a href=\"http:\/\/Https:\/\/temple.zoom.us\/j\/5316144165\">(VIRTUAL CLASS)<\/a><\/p>\n<\/td>\n<td width=\"126\">\n<p>March 27<\/p>\n<p>NO CLASS<\/p>\n<\/td>\n<td width=\"288\">\n<p>\nPhysical Security<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"623\">\n<p>Sun, Mar 30 <strong>Milestone 3<\/strong> Penetration Test Findings Report Due<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>11<\/p>\n<\/td>\n<td width=\"132\">\n<p>April 1<\/p>\n<\/td>\n<td width=\"126\">\n<p>April 3<\/p>\n<\/td>\n<td width=\"288\">\n<p>Malware Analysis<\/p>\n<p>Network Security Monitoring<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>12<\/p>\n<\/td>\n<td width=\"132\">\n<p>April 8<\/p>\n<\/td>\n<td width=\"126\">\n<p>April 10 \u2013 no class<\/p>\n<\/td>\n<td width=\"288\">\n<p>Incident Response &amp; Recovery: Equifax Case Study<\/p>\n<p>Incident Response &amp; Recovery: Maersk Case Study<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>13<\/p>\n<\/td>\n<td width=\"132\">\n<p>April 15<\/p>\n<\/td>\n<td width=\"126\">\n<p>April 17<\/p>\n<\/td>\n<td width=\"288\">\n<p>Milestone 3 Report Feedback Individual Feedback Session \u2013 no class<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>14<\/p>\n<\/td>\n<td width=\"132\">\n<p>April 22<\/p>\n<\/td>\n<td width=\"126\">\n<p>April 24<\/p>\n<\/td>\n<td width=\"288\">\n<p>Incident Response &amp; Recovery: Equifax Case Study<\/p>\n<p>Incident Response &amp; Recovery: Maersk Case Study<\/p>\n<p>Milestone 4 Report Draft Q&amp;A<\/p>\n<p>Course Review &amp; Wrap-Up<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"623\">\n<p>Sun, April 27 <strong>Milestone 4<\/strong> Penetration Test Findings with Recommendations Report Due<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Week Tuesday Thursday Topics 1 Jan 14 Jan 16 \u2013 No Class Introduction 2 Jan 21 Jan 23 Threat Modeling Risk Assessment &amp; Milestone 1 Report Q&amp;A Sun, Jan 26 Milestone 1 Risk Assessment Report Due 3 Jan 28 Jan 30 Introduction to Linux and Google Cloud Platform Data Privacy 4 Feb 4 Feb 6 [&hellip;]<\/p>\n","protected":false},"author":3172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-22","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/users\/3172"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":217,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/pages\/22\/revisions\/1258"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2025\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}