Pre-Units / General Labs
- Lab – Linux 101
- Lab – Linux 102
- Lab – Fuzzing
Unit 1 – Actors, Motivations, CIA & Authentication Lesson Plan
- 2.1.1 – Threat Actors — Notes / PPT / Guided Notes / Answer Key / Case Study: Stuxnet / Quiz Key
- 1.2.1 – CIA Triad and AAA — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 4.6.2 – Multifactor Authentication (MFA) — Notes / PPT / Guided Notes / Answer Key / Case Study: Biometrics / Quiz Key
- 2.4.14 – Password Attacks — Notes / PPT / Guided Notes / Answer Key / Labs: Passwords, Rainbow Table, Brute Force Offline, Brute Force Online / Quiz Key
- 4.6.3 – Passwords — Notes / PPT / Guided Notes / Answer Key / Lab: Dictionary / Quiz Key
Unit 2 – Social Engineering & Access Control Lesson Plan
- 2.2.2 – Principles of Social Engineering — Notes / PPT / Guided Notes / Answer Key / Case Study: Influence Campaigns / Quiz Key
- 2.2.3 – Phishing and Spam — Notes / PPT / Guided Notes / Answer Key / Lab: Credential Harvesting / Case Study: Salesforce Phishing / Quiz Key
- 5.6.1 – Phishing Awareness — Notes / PPT / Guided Notes / Answer Key / Lab: Phishing / Quiz Key
- 2.2.4 – Misinformation & Impersonation — Notes / PPT / Guided Notes / Answer Key / Case Study: Hoaxes / Quiz Key
- 2.2.5 – Watering Hole Attacks & Typosquatting — Notes / PPT / Guided Notes / Answer Key / Lab: Typosquatting / Case Study: Watering Hole / Quiz Key
- 5.6.2 – Security Awareness — Notes / PPT / Guided Notes / Answer Key / Case Study: Insider Threat / Quiz Key
Unit 3 – Threats & Attack Surfaces Lesson Plan
- 2.4.1 – Malware — Notes / PPT / Guided Notes / Answer Key / Case Study: Malware / Quiz Key
- 2.4.2 – Ransomware — Notes / PPT / Guided Notes / Answer Key / Lab: Ransomware / Case Study: FBI Response to REvil / Quiz Key
- 2.4.3 – Trojans, Backdoors, and RATs — Notes / PPT / Guided Notes / Answer Key / Labs: Trojan, Backdoor, RAT/Bot / Case Study: TeaBot Malware / Quiz Key
- 2.4.4 – Viruses, Worms, Spyware & Adware — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.4.5 – Keyloggers — Notes / PPT / Guided Notes / Answer Key / Labs: Intro to Keyloggers, Keylogger Application / Quiz Key
- 2.4.6 – Logic Bombs & Rootkits — Notes / PPT / Guided Notes / Answer Key / Case Study: Logic Bomb / Quiz Key
- 2.2.1 – Common Attack Surfaces — Notes / PPT / Guided Notes / Answer Key / Case Study: Wireless Security / Quiz Key
- 2.4.8 – DoS and DDoS Attacks — Notes / PPT / Guided Notes / Answer Key / Lab: Denial of Service / Case Study: Botnet / Quiz Key
- 2.4.9 – DNS Attacks — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.4.10 – Wireless, On-Path, and Replay Attacks — Notes / PPT / Guided Notes / Answer Key / Lab: Session Replay / Case Study: Wireless Disassociation / Quiz Key
- 4.5.1 – Endpoint: Protocol & Email Security — Notes / PPT / Guided Notes / Answer Key / Case Study: Heartbleed / Quiz Key
- 4.1.2 – Wireless Devices — Notes / PPT / Guided Notes / Answer Key / Case Study: Wireless Jamming / Quiz Key
- 2.3.1 – Application Vulnerabilities — Notes / PPT / Guided Notes / Answer Key / Case Studies: Race Conditions, iPhone Integer Overflow / Quiz Key
- 2.4.11 – Application Attacks (Part 1) — Notes / PPT / Guided Notes / Answer Key / Labs: Directory Traversal, Privilege Escalation, Pass the Hash / Quiz Key
- 2.4.12 – Application Attacks (Part 2) — Notes / PPT / Guided Notes / Answer Key / Labs: Buffer Overflow, Command Injection, Intro CSRF, CSRF Application / Case Study: Chrome Crash Catastrophe / Quiz Key
- 4.1.4 – Application Security — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.3.2 – OS and Web-based Vulnerabilities — Notes / PPT / Guided Notes / Answer Key / Labs: SQL Injection (DVWA, Juice Shop), XSS (DVWA, Juice Shop) / Quiz Key
- 4.5.2 – Endpoint: OS & Monitoring — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.3.3 – Hardware & Virtualization Vulnerabilities — Notes / PPT / Guided Notes / Answer Key / Case Study: VENOM / Quiz Key
- 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities — Notes / PPT / Guided Notes / Answer Key / Case Study: Zero-Day Attack / Quiz Key
- 4.1.3 – Mobile Solutions — Notes / PPT / Guided Notes / Answer Key / Case Study: Geolocation / Quiz Key
- 2.4.7 – Physical Attacks — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.2.3 – Physical Security — Notes / PPT / Guided Notes / Answer Key / Quiz Key
Unit 4 – Cryptographic Solutions Lesson Plan
- 1.4.2 – Encryption — Notes / PPT / Guided Notes / Answer Key / Labs: Linux Personal File Encryption, Windows 7 Personal File Encryption / Quiz Key
- 1.4.4 – Obfuscation & Steganography — Notes / PPT / Guided Notes / Answer Key / Labs: Obfuscation, Steganography / Case Study: Steganography / Quiz Key
- 1.4.5 – Hashing, Digital Signatures, and Blockchain — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.4.1 – Public Key Infrastructure — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.4.6 – Certificates — Notes / PPT / Guided Notes / Answer Key / Lab: Certificates / Quiz Key
- 1.4.3 – Cryptographic Tools — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.4.13 – Cryptographic Attack — Notes / PPT / Guided Notes / Answer Key / Lab: Collision / Quiz Key
Unit 5 – Vulnerability Analysis & Remediation Lesson Plan
- 4.3.1 – Identifying Vulnerabilities — Notes / PPT / Guided Notes / Answer Key / Lab: ip-ifconfig / Case Study: Pen Testing / Quiz Key
- 5.5.2 – Pentesting — Notes / PPT / Guided Notes / Answer Key / Case Study: Bug Bounty / Quiz Key
- 4.4.1 – Monitoring Resources — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 4.4.2 – Monitoring Tools — Notes / PPT / Guided Notes / Answer Key / Labs: Wireshark, tcpdump / Quiz Key
- 1.2.4 – Deception and Disruption Technology — Notes / PPT / Guided Notes / Answer Key / Lab: Honeypot / Quiz Key
- 4.3.2 – Vulnerability Management — Notes / PPT / Guided Notes / Answer Key / Quiz Key
Unit 6 – Security Controls Lesson Plan
- 1.1.1 – Security Controls — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 3.1.2 – Architecture Considerations — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 3.2.1 – Infrastructure Considerations — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.5.2 – Hardening Techniques — Notes / PPT / Guided Notes / Answer Key / Labs: Backdoor Removal, RAT Removal, Backdoor Shortcut / Quiz Key
- 4.5.3 – Endpoint: Firewall, IDS/IPS & Web Filter — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 3.2.2 – Network Appliances — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 2.5.1 – Mitigation Techniques — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 3.2.3 – Secure Communication/Access and Effective Controls — Notes / PPT / Guided Notes / Answer Key / Case Study: NordVPN Hack / Quiz Key
Unit 7 – Data Management Lesson Plan
- 3.3.1 – Data Classification and Types — Notes / PPT / Guided Notes / Answer Key / Case Study: Handling Sensitive Data / Quiz Key
- 3.3.2 – Data Sovereignty and Protection — Notes / PPT / Guided Notes / Answer Key / Lab: File Hashing / Quiz Key
- 3.4.1 – Resilience and Recovery I — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 3.4.2 – Resilience and Recovery II — Notes / PPT / Guided Notes / Answer Key / Quiz Key
Unit 8 – Infrastructure & SecOps Lesson Plan
- 3.1.1 – Architecture and Infrastructure Concepts — Notes / PPT / Guided Notes / Answer Key / Case Study: Specialized Systems Vulnerabilities / Quiz Key
- 4.1.1 – Hardening Targets and Secure Baselines — Notes / PPT / Guided Notes / Answer Key / Case Study: Exposure Through Cloud Misconfiguration / Quiz Key
- 4.6.1 – Access Management — Notes / PPT / Guided Notes / Answer Key / Case Study: Quantum Cryptography / Quiz Key
- 4.7.1 – Scripting and Automation — Notes / PPT / Guided Notes / Answer Key / Quiz Key
Unit 9 – Incident Response Lesson Plan
- 2.4.15 – Indicators of Malicious Activity — Notes / PPT / Guided Notes / Answer Key / Case Study: Equifax / Quiz Key
- 4.8.1 – Incident Response — Notes / PPT / Guided Notes / Answer Key / Lab: Cuckoo / Case Study: Incident Response / Quiz Key
- 4.9.1 – Logs — Notes / PPT / Guided Notes / Answer Key / Lab: Metadata / Quiz Key
Unit 10 – Processes & Governance Lesson Plan
- 1.2.2 – Gap Analysis and Zero Trust — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.3.1 – Business Processes — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.3.2 – Technical Implications of Change Management — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 1.3.3 – Documentation and Version Control of Change Management — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 4.2.1 – Data Asset Management — Notes / PPT / Guided Notes / Answer Key / Lab: Data Sanitization / Case Study: Data Destruction / Quiz Key
- 5.1.1 – Security Governance — Notes / PPT / Guided Notes / Answer Key / Case Study: The GDPR / Quiz Key
Unit 11 – Risk, Audits & Compliance Lesson Plan
- 5.2.1 – Risk Management — Notes / PPT / Guided Notes / Answer Key / Case Study: Failure to Disclose / Quiz Key
- 5.3.1 – Third-Party Vendors — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 5.4.1 – Security Compliance — Notes / PPT / Guided Notes / Answer Key / Quiz Key
- 5.5.1 – Audits & Attestation — Notes / PPT / Guided Notes / Answer Key / Quiz Key