Week | Tue |
Thur |
Topics |
---|---|---|---|
1 | Aug 24 | Aug 26 |
Introduction Threat Modeling |
2 | Aug 31 | Sep 2 |
Risk Assessment Information Privacy |
3 | Sep 7 | Sep 9 |
Introduction to Linux and Google Cloud Platform Introduction to Cryptography |
4 | Sep 14 | Sep 16 |
Symmetric Cryptography Hashing |
5 | Sep 21 | Sep 23 |
Asymmetric Cryptography Digital Certificates and Public Key Infrastructures |
6 | Sep 28 | Sep 30 |
Authentication and Passwords Password Cracking |
7 | Oct 5 | Oct 7 | Guest Speaker |
8 | Oct 12 | Oct 14 | Vulnerability Scanning |
9 | Oct 19 | Oct 21 | Vulnerability Exploitation |
10 | Oct 26 | Oct 28 |
Physical Security Human Elements of Security |
11 | Nov 2 | Nov 4 |
Network Security Monitoring / Incident Response |
12 | Nov 9 | Nov 11 | Incident Recovery |
13 | Nov 16 | Nov 18 | Malware Analysis |
Nov 23 | Nov 25 | Thanksgiving Break | |
14 | Nov 30 | Dec 2 | Course Wrap-Up |