Week |
Tuesday |
Topics |
1 |
Jan 17 |
Introduction Threat Modeling |
2 |
Jan 24 |
Introduction to Cryptography Symmetric Cryptography |
3 |
Jan 31 |
Hashing Asymmetric Cryptography |
4 |
Feb 7 |
Digital Certificates and Public Key Infrastructures Introduction to Linux and Google Cloud Platform |
5 |
Feb 14 |
Authentication and Passwords Password Cracking |
6 |
Feb 21 |
Password Cracking |
7 |
Feb 28 |
Vulnerability Scanning Vulnerability Exploitation |
8 |
Mar 14 |
Vulnerability Exploitation |
9 |
Mar 21 |
Social Engineering |
10 |
Mar 28 |
Physical Security Malware Analysis |
11 |
Apr 4 |
Network Security Monitoring |
12 |
Apr 11 |
Risk Assessment Information Privacy |
13 |
Apr 18 |
Incident Response and Recovery |
14 |
Apr 25 |
Incident Response and Recovery |