Lectures (8:00 - 10 mins
Week No Day/Hour Frameworks and Concepts (9:00 - 9:50 AM) Practical (10:00 - 11:00 AM)
9:00 AM) (Break)
Introduction 30-Jan Program Intro Intro to Networking and Cybersecurity Intro to Networking and Cybersecurity
Week 31-Jan Contract/Intro Intro to Networking and Cybersecurity Intro to Networking and Cybersecurity
3-Feb Report Writing Setting Up Your Home Lab and Installing Tools
4-Feb OSI & TCP IP Models Lab 1-1: Linux Fundamentals Part 1
Chapter 1 -
Week 1 5-Feb Introduction to GRC Lab 1-2: Linux Fundamentals Part 2
6-Feb Security Unified Kill Chain Lab 1-3: Linux Fundamentals Part 3
Week 1 discussed topics and frameworks
7-Feb Week 1 Linux Labs Assessment
assessment/review
10-Feb Chapter 1 Quiz - Week 1 Quiz Project 2-1: Comparing Data Breach Notification Letters
Chapter 2 -
11-Feb MITRE ATT&CK Project 2-2: Phishing Awareness
Malware and
12-Feb Social WannaCry Ransomware Lab 2-3: Credential Harvesting Using Site Cloning
Week 2
13-Feb Engineering Colonial Pipeline Attack Lab 2-4: Nmap
Attacks Week 2 discussed topics and frameworks
14-Feb Week 2 Hand-on Projects and Labs Assessment
assessment/review
17-Feb Holiday: Monday February 17 Martin Luther King Jr. Day
18-Feb Chapter 2 Quiz - Week 2 Quiz Lab 3-1: How to crack passwords with Hashcat
19-Feb Mirai IoT Botnet Lab 3-2: Capturing password hashes with Responder
Week 3 20-Feb Chapter 3 - Basic OWASP Top Ten Lab 3-3: Ping and Its Various Uses
21-Feb Cryptography Cipher Block Modes of Operation Lab 3- 4: Using Traceroute in Linux
Week 3 discussed topics and frameworks
24-Feb Week 3 Hand-on Projects and Labs Assessment
assessment/review
25-Feb Chapter 3 Quiz- Week 3 Quiz Lab 4-1: Cracking Basic Hashes with John the Ripper
26-Feb NERC CIP Project 4-2: Using OpenPuff Steganography
Chapter 4 -
27-Feb Advanced Identity and Access Management (IAM) Lifecycle Project 4-3: Running an RSA Cipher Demonstration
Week 4
Cryptography and
28-Feb PKI Enterprise Deployment Models Lab 4-4: NsLookup
Week 4 discussed topics and frameworks
3-Mar Week 4 Hand-on Projects and Labs Assessment
assessment/review
4-Mar Chapter 4 Quiz - Week 4 Quiz Lab 5-1: Using Curl
5-Mar Security Control Types Lab 5-2: Dig Command
Chapter 5 -
6-Mar Researching Skills Lab 5-3: Netcat
Week 5 Networking and
7-Mar Server Attacks IPv4 vs IPv6 Lab 5-4: SSH
Server Attacks
Week 5 discussed topics and frameworks
10-Mar Week 5 Hand-on Projects and Labs Assessment
assessment/review
11-Mar Chapter 5 Quiz - Week 5 Quiz Lab 6-1: MAC Address Spoofing
Lab 6-2: Using ipconfig to view and modify network
12-Mar Network Segmentation vs Microsegmentation
Chapter 6 - information on Windows
Network Security Lab 6-3: Using ifconfig to view and modify network information
Week 6 13-Mar Active Directory & LDAP
Devices, Design on Linux
14-Mar and Technology System Lifecycle Management Lab 6-4: Introduction to Python scripting
Week 6 discussed topics and frameworks
17-Mar Week 6 Hand-on Projects and Labs Assessment
assessment/review
Lab 7-1: Conducting a dictionary attack to crack online
18-Mar Chapter 6 Quiz - Week 6 Quiz
passwords using Hydra
19-Mar PCI-DSS Lab 7-2: Information Gathering using theHarvester
Chapter 7 -
Lab 7-3: Capturing credentials submitted through HTTP with
Week 7 20-Mar Administering a VPN and its Types
Wireshark
Secure Network
21-Mar CIS Benchmarks and Controls Lab 7-4: Packet Capture using Tcpdump
Week 7 discussed topics and frameworks
24-Mar Week 7 Hand-on Projects and Labs Assessment
assessment/review
25-Mar Chapter 7 Quiz - Week 7 Quiz Lab 8-1: Creating Metasploit Payloads with Msfvenom
26-Mar SolarWinds Attack Lab 8-2: Basic Meterpreter commands
Lab 8-3: Exploiting a vulnerable FTP service to gain a shell
27-Mar Chapter 8 - GDPR
using Metasploit
Week 8 Wireless Network
28-Mar Security Penetration Testing Lifecycle Lab 8-4: Basic Pentesting
31-Mar Holiday: Monday March 31 Cesar Chavez Day/Eid-ul-Fitr
Week 8 discussed topics and frameworks
1-Apr Week 8 Hand-on Projects and Labs Assessment
assessment/review
2-Apr Chapter 8 Quiz - Week 8 Quiz
3-Apr Vulnerability Assessment Lifecycle
Chapter 9 - Client
Week 9 4-Apr and Application Vulnerability Assessment vs Penetration Testing
Security
7-Apr SDLC (Waterfall vs Agile vs DevOps)
Week 9 discussed topics and frameworks
8-Apr
assessment/review
9-Apr Chapter 9 Quiz - Week 9 Quiz
10-Apr ISO 27001 Framework
Chapter 10 -
Week 10
11-Apr
Mobile and
ISO 27002 Framework Group Project: Red Team vs. Blue Team
14-Apr Embedded Device Cyber Kill Chain Project: Work in a group where one member
Security attempts to attack a target system by exploiting
Security attempts to attack a target system by exploiting
Week 10 discussed topics and frameworks
15-Apr
assessment/review vulnerabilities, while the other defends or
16-Apr Chapter 10 Quiz - Week 10 Quiz investigates the attack as part of incident
17-Apr HIPAA response. Tools such as Kali Linux, Virtual
Chapter 11 -
Week 11
18-Apr
Authentication
Cyber Essentials Machine, Caldera BAS, Comodo Dragon
21-Apr and Account ARCO (EDR), Splunk (SIEM).
Management Week 11 discussed topics and frameworks
22-Apr
assessment/review
23-Apr Chapter 11 Quiz - Week 11 Quiz
24-Apr NIST Cybersecurity Framework
Chapter 12 -
Week 12 25-Apr Access NIST 800-53
28-Apr Management Incident Response Lifecycle
Week 12 discussed topics and frameworks
29-Apr
assessment/review
30-Apr Chapter 12 Quiz - Week 12 Quiz
1-May NIST Privacy Framework
Chapter 13 -
2-May Vulnerability HITRUST Common Security Framework
Week 13
Assessment and
5-May Data Security FEDRAMP
Week 13 discussed topics and frameworks
6-May
assessment/review
7-May Chapter 13 Quiz - Week 13 Quiz
8-May FISMA/FIPPs
9-May Chapter 14 - Risk Management Lifecycle
Week 14
Business
12-May Continuity COBIT / COSO
Week 14 discussed topics and frameworks Final Project: Simulate an attack and digital
13-May
assessment/review forensic process. Identify via tools such as
14-May Chapter 14 Quiz - Week 14 Quiz Nessus and Nmap, and exploit system
15-May
Review Chapter 1: Threats, Attacks, and vulnerabilities (e.g., using a backdoor or
Vulnerabilities - Domain 1 Questions command-and-control methods via Metasploit),
Chapter 15 - Risk Review Chapter 2: Technologies and Tools -
Week 15 16-May Mitigation then conduct a thorough investigation using
Domain 2 Questions
tools like Autopsy.
Review Chapter 3: Architecture and Design -
tools like Autopsy.
19-May
Domain 3 Questions
20-May Domain 1, 2 & 3 Answers and Explanations
21-May Chapter 15 Quiz - Week 15 Quiz
Review Chapter 4: Identity and Access
22-May
Management - Domain 4 Questions
Chapter 16 - Review Chapter 5: Risk Management - Domain 5
Week 16 23-May
Standards and Questions
26-May Frameworks Holiday: Monday May 26 Memorial Day
Review Chapter 6: Cryptography and PKI -
27-May
Domain 6 Questions
28-May Domain 4, 5 & 6 Answers and Explanations
Chapter 16 Quiz -
29-May Chapter 7: Practice Exam 1
Week 16 Quiz
Week 17 30-May Final Assessment