{"id":22,"date":"2018-01-17T14:36:08","date_gmt":"2018-01-17T19:36:08","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=22"},"modified":"2026-03-24T13:57:56","modified_gmt":"2026-03-24T17:57:56","slug":"schedule","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/","title":{"rendered":"Schedule"},"content":{"rendered":"<table style=\"width: 80.8294%;height: 1646px\">\n<tbody>\n<tr style=\"height: 56px\">\n<td style=\"width: 12.6154%;height: 56px\" width=\"78\">\n<p>Week<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 56px\" width=\"132\">\n<p>Tuesday<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 56px\" width=\"288\">\n<p>Topics<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 12.6154%;height: 56px\" width=\"78\">\n<p>1<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 56px\" width=\"132\">\n<p>Jan 13<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 56px\" width=\"288\">\n<p>Introduction and Threat Modeling<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"width: 12.6154%;height: 80px\" width=\"78\">\n<p>2<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 80px\" width=\"132\">\n<p>Jan 20<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 80px\" width=\"288\">\n<p>Risk Assessment &amp; Milestone 1 Report Q&amp;A<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 78.3077%;height: 56px\" colspan=\"3\" width=\"623\">\n<p style=\"text-align: center\">Sun, Jan 25 <strong>Milestone 1<\/strong> Risk Assessment Report Due<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 120px\">\n<td style=\"width: 12.6154%;height: 120px\" width=\"78\">\n<p>3<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 120px\" width=\"132\">\n<p>Jan 27<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 120px\" width=\"288\">\n<p>Introduction to Linux and Google Cloud Platform<\/p>\n<p>Data Privacy<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"width: 12.6154%;height: 80px\" width=\"78\">\n<p>4<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 80px\" width=\"132\">\n<p>Feb 3<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 80px\" width=\"288\">\n<p>Milestone 1 Report Feedback \u2013 Individual Feedback Session \u2013 no class<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 12.6154%;height: 96px\" width=\"78\">\n<p>5<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 96px\" width=\"132\">\n<p>Feb 10<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 96px\" width=\"288\">\n<p>Introduction to Cryptography<\/p>\n<p>Symmetric Cryptography &amp; Hashing<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 78.3077%;height: 56px\" colspan=\"3\" width=\"623\">\n<p style=\"text-align: center\">Sun, Feb 15 <strong>Milestone 2<\/strong> Final Risk Assessment Report Due<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 120px\">\n<td style=\"width: 12.6154%;height: 120px\" width=\"78\">\n<p>6<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 120px\" width=\"132\">\n<p>Feb 17<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 120px\" width=\"288\">\n<p>Asymmetric Cryptography<\/p>\n<p>Digital Certificates and Public Key Infrastructures<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 12.6154%;height: 96px\" width=\"78\">\n<p>7<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 96px\" width=\"132\">\n<p>Feb 24<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 96px\" width=\"288\">\n<p>Authentication and Passwords<\/p>\n<p>Password Cracking<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 10px\">\n<td style=\"width: 12.6154%;height: 10px\" colspan=\"3\">\n<p style=\"text-align: center\">Spring break &#8211; No class<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 12.6154%;height: 96px\" width=\"78\">\n<p>8<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 96px\" width=\"132\">\n<p>Mar 10<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 96px\" width=\"288\">\n<p>Vulnerability Scanning<\/p>\n<p>Vulnerability Exploitation<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 120px\">\n<td style=\"width: 12.6154%;height: 120px\" width=\"78\">\n<p>9<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 120px\" width=\"132\">\n<p>Mar 17<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 120px\" width=\"288\">\n<p>Milestone 3 Report Q&amp;A<\/p>\n<p>Human Element \u2013 Info. Security in Organizations<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"width: 12.6154%;height: 104px\" width=\"78\">\n<p>10<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 104px\" width=\"132\">\n<p>Mar 24<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 104px\" width=\"288\">\n<p>\nPhysical Security<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 78.3077%;height: 56px\" colspan=\"3\" width=\"623\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 12.6154%;height: 96px\" width=\"78\">\n<p>11<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 96px\" width=\"132\">\n<p>Mar 31<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 96px\" width=\"288\">\n<p>Malware Analysis<\/p>\n<p>Network Security Monitoring<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 12.6154%\" colspan=\"3\">Thursday, April 2 <strong>Milestone 3<\/strong> Penetration Test Findings Report Due<\/td>\n<\/tr>\n<tr style=\"height: 144px\">\n<td style=\"width: 12.6154%;height: 144px\" width=\"78\">\n<p>12<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 144px\" width=\"132\">\n<p>Apr 7<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 144px\" width=\"288\">\n<p>Milestone 3 Report Feedback Individual Feedback Session \u2013 no class<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"width: 12.6154%;height: 80px\" width=\"78\">\n<p>13<\/p>\n<\/td>\n<td style=\"width: 20.9231%;height: 80px\" width=\"132\">\n<p>Apr 14<\/p>\n<\/td>\n<td style=\"width: 44.7692%;height: 80px\" width=\"288\">\n<p>Incident Response &amp; Recovery: Equifax Case Study<\/p>\n<p>Incident Response &amp; Recovery: Maersk Case Study<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 12.6154%\">\n<p>14<\/p>\n<\/td>\n<td style=\"width: 20.9231%\">\n<p>Apr 21<\/p>\n<\/td>\n<td style=\"width: 44.7692%\">\n<p>Milestone 4 Report Draft Q&amp;A<\/p>\n<p>Course Review &amp; Wrap-Up<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 78.3077%;height: 56px\" colspan=\"3\" width=\"623\">\n<p style=\"text-align: center\">Sun, Apr 26 <strong>Milestone 4<\/strong> Penetration Test Findings with Recommendations Report Due<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Week Tuesday Topics 1 Jan 13 Introduction and Threat Modeling 2 Jan 20 Risk Assessment &amp; Milestone 1 Report Q&amp;A Sun, Jan 25 Milestone 1 Risk Assessment Report Due 3 Jan 27 Introduction to Linux and Google Cloud Platform Data Privacy 4 Feb 3 Milestone 1 Report Feedback \u2013 Individual Feedback Session \u2013 no class [&hellip;]<\/p>\n","protected":false},"author":3172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-22","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/users\/3172"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":222,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":1296,"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/pages\/22\/revisions\/1296"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec005spring2026\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}