1 |
Introduction 1 |
Lab: Think like a Hacker 1.7 Introduction Review Questions 1.8
|
1.1, 1.2, 1.6, 2.7 |
2 |
Cryptography 2 |
Lab: Hash it Out 2.11 Cryptography Review Questions 2.12
|
1.2, 1.3, 1.6, 2.1, 2.4, 2.5, 2.8, 3.9 |
3 |
Malware 3 |
Lab: Malware Analysis 3.7 Malware Review Questions 2.12
|
1.2, 1.3, 1.4, 2.5, 4.1, 4.3, 4.5 |
4 |
Protocols 4 |
Lab: Scanning with nmap 4.6 Protocols Review Questions 4.7
|
1.3, 1.6, 1.7, 3.1, 3.2, 4.1 |
5 |
Attacks 5 |
Quiz 1 Attacks Review Questions 5.8
|
1.2, 1.3, 1.4, 1.8, 3.3, 3.4, 4.1, 4.2 |
6 |
Introduction 1, Cryptography 2, Malware 3, Protocols 4, Attacks 5
|
Midterm Review Lab: MitM with Scapy 5.7
|
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 2.1, 2.4, 2.5, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.8, 3.9, 4.1, 4.2, 4.3, 4.5 |
7 |
Introduction 1, Cryptography 2, Malware 3, Protocols 4, Attacks 5
|
Midterm |
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 2.1, 2.4, 2.5, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.8, 3.9, 4.1, 4.2, 4.3, 4.5 |
8 |
Security Solution 6, |
Lab: Exploiting log4j 6.9, Security Solutions Review 6.10 Questions |
3.1, 3.2, 3.3, 3.6, 4.1, 4.2 |
9 |
Access Controls 7 |
Lab: Linux File Permissions 7.4, Access Controls Review Questions 7.5
|
2.1, 2.2, 2.4, 2.7, 3.3, 3.4, 3.8, 5.1 |
10 |
Vulnerability Management and Compliance 8 |
Lab: Scanning with Nessus 8.3, Vulnerability Management and 8.4 Compliance Review Questions 8.4
|
5.1, 5.2, 5.3, 5.4, 5.5 |
11 |
Incident Response and Continuity 9 |
Lab: Reporting on the 2014 Sony Pictures Hack 9.6 Incident Response and Recovery Review Questions 9.7
|
1.2, 1.3, 1.4, 1.7, 1.8 2.3, 2.5, 3.1, 3.2, 3.3, 3.4 4.1, 4.2, 4.3, 4.4, 4.5 5.3, 5.4, 5.5 |
12 |
Virtualization 10 |
Lab: Malicious Containers 10.5 Virtualization Review Questions 10.6
|
2.3, 3.6, 3.6 |
13 |
Mobile Solutions |
Quiz 2 |
3.5 |
14 |
Security Solutions 6, Access Controls 7, Vulnerability Management and Compliance 8, Incident Response and Continuity 9, Virtualization 10, Mobile Solutions |
Final Review |
1.2, 1.3, 1.4, 1.7, 1.8, 2.1, 2.2, 2.3, 2.4, 2.5, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2, 5.3, 5.4, 5.5 |
15 |
Security Solutions 6, Access Controls 7, Vulnerability Management and Compliance 8, Incident Response and Continuity 9, Virtualization 10, Mobile Solutions |
Final Exam |
1.2, 1.3, 1.4, 1.7, 1.8, 2.1, 2.2, 2.3, 2.4, 2.5, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2, 5.3, 5.4, 5.5 |