0% found this document useful (0 votes)
14 views4 pages

Bootcamp Schedule - Morning Class

Uploaded by

Ranjitha G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

Bootcamp Schedule - Morning Class

Uploaded by

Ranjitha G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Lectures (8:00 - 10 mins

Week No Day/Hour Frameworks and Concepts (9:00 - 9:50 AM) Practical (10:00 - 11:00 AM)
9:00 AM) (Break)

Introduction 30-Jan Program Intro Intro to Networking and Cybersecurity Intro to Networking and Cybersecurity
Week 31-Jan Contract/Intro Intro to Networking and Cybersecurity Intro to Networking and Cybersecurity
3-Feb Report Writing Setting Up Your Home Lab and Installing Tools
4-Feb OSI & TCP IP Models Lab 1-1: Linux Fundamentals Part 1
Chapter 1 -
Week 1 5-Feb Introduction to GRC Lab 1-2: Linux Fundamentals Part 2
6-Feb Security Unified Kill Chain Lab 1-3: Linux Fundamentals Part 3
Week 1 discussed topics and frameworks
7-Feb Week 1 Linux Labs Assessment
assessment/review

10-Feb Chapter 1 Quiz - Week 1 Quiz Project 2-1: Comparing Data Breach Notification Letters
Chapter 2 -
11-Feb MITRE ATT&CK Project 2-2: Phishing Awareness
Malware and
12-Feb Social WannaCry Ransomware Lab 2-3: Credential Harvesting Using Site Cloning
Week 2
13-Feb Engineering Colonial Pipeline Attack Lab 2-4: Nmap
Attacks Week 2 discussed topics and frameworks
14-Feb Week 2 Hand-on Projects and Labs Assessment
assessment/review
17-Feb Holiday: Monday February 17 Martin Luther King Jr. Day
18-Feb Chapter 2 Quiz - Week 2 Quiz Lab 3-1: How to crack passwords with Hashcat
19-Feb Mirai IoT Botnet Lab 3-2: Capturing password hashes with Responder

Week 3 20-Feb Chapter 3 - Basic OWASP Top Ten Lab 3-3: Ping and Its Various Uses
21-Feb Cryptography Cipher Block Modes of Operation Lab 3- 4: Using Traceroute in Linux
Week 3 discussed topics and frameworks
24-Feb Week 3 Hand-on Projects and Labs Assessment
assessment/review
25-Feb Chapter 3 Quiz- Week 3 Quiz Lab 4-1: Cracking Basic Hashes with John the Ripper
26-Feb NERC CIP Project 4-2: Using OpenPuff Steganography
Chapter 4 -
27-Feb Advanced Identity and Access Management (IAM) Lifecycle Project 4-3: Running an RSA Cipher Demonstration
Week 4
Cryptography and
28-Feb PKI Enterprise Deployment Models Lab 4-4: NsLookup
Week 4 discussed topics and frameworks
3-Mar Week 4 Hand-on Projects and Labs Assessment
assessment/review
4-Mar Chapter 4 Quiz - Week 4 Quiz Lab 5-1: Using Curl
5-Mar Security Control Types Lab 5-2: Dig Command
Chapter 5 -
6-Mar Researching Skills Lab 5-3: Netcat
Week 5 Networking and
7-Mar Server Attacks IPv4 vs IPv6 Lab 5-4: SSH
Server Attacks
Week 5 discussed topics and frameworks
10-Mar Week 5 Hand-on Projects and Labs Assessment
assessment/review
11-Mar Chapter 5 Quiz - Week 5 Quiz Lab 6-1: MAC Address Spoofing
Lab 6-2: Using ipconfig to view and modify network
12-Mar Network Segmentation vs Microsegmentation
Chapter 6 - information on Windows
Network Security Lab 6-3: Using ifconfig to view and modify network information
Week 6 13-Mar Active Directory & LDAP
Devices, Design on Linux
14-Mar and Technology System Lifecycle Management Lab 6-4: Introduction to Python scripting
Week 6 discussed topics and frameworks
17-Mar Week 6 Hand-on Projects and Labs Assessment
assessment/review
Lab 7-1: Conducting a dictionary attack to crack online
18-Mar Chapter 6 Quiz - Week 6 Quiz
passwords using Hydra
19-Mar PCI-DSS Lab 7-2: Information Gathering using theHarvester
Chapter 7 -
Lab 7-3: Capturing credentials submitted through HTTP with
Week 7 20-Mar Administering a VPN and its Types
Wireshark
Secure Network
21-Mar CIS Benchmarks and Controls Lab 7-4: Packet Capture using Tcpdump
Week 7 discussed topics and frameworks
24-Mar Week 7 Hand-on Projects and Labs Assessment
assessment/review
25-Mar Chapter 7 Quiz - Week 7 Quiz Lab 8-1: Creating Metasploit Payloads with Msfvenom
26-Mar SolarWinds Attack Lab 8-2: Basic Meterpreter commands
Lab 8-3: Exploiting a vulnerable FTP service to gain a shell
27-Mar Chapter 8 - GDPR
using Metasploit
Week 8 Wireless Network
28-Mar Security Penetration Testing Lifecycle Lab 8-4: Basic Pentesting
31-Mar Holiday: Monday March 31 Cesar Chavez Day/Eid-ul-Fitr
Week 8 discussed topics and frameworks
1-Apr Week 8 Hand-on Projects and Labs Assessment
assessment/review
2-Apr Chapter 8 Quiz - Week 8 Quiz
3-Apr Vulnerability Assessment Lifecycle
Chapter 9 - Client
Week 9 4-Apr and Application Vulnerability Assessment vs Penetration Testing
Security
7-Apr SDLC (Waterfall vs Agile vs DevOps)
Week 9 discussed topics and frameworks
8-Apr
assessment/review
9-Apr Chapter 9 Quiz - Week 9 Quiz
10-Apr ISO 27001 Framework
Chapter 10 -
Week 10
11-Apr
Mobile and
ISO 27002 Framework Group Project: Red Team vs. Blue Team
14-Apr Embedded Device Cyber Kill Chain Project: Work in a group where one member
Security attempts to attack a target system by exploiting
Security attempts to attack a target system by exploiting
Week 10 discussed topics and frameworks
15-Apr
assessment/review vulnerabilities, while the other defends or
16-Apr Chapter 10 Quiz - Week 10 Quiz investigates the attack as part of incident
17-Apr HIPAA response. Tools such as Kali Linux, Virtual
Chapter 11 -
Week 11
18-Apr
Authentication
Cyber Essentials Machine, Caldera BAS, Comodo Dragon
21-Apr and Account ARCO (EDR), Splunk (SIEM).
Management Week 11 discussed topics and frameworks
22-Apr
assessment/review

23-Apr Chapter 11 Quiz - Week 11 Quiz

24-Apr NIST Cybersecurity Framework


Chapter 12 -
Week 12 25-Apr Access NIST 800-53
28-Apr Management Incident Response Lifecycle
Week 12 discussed topics and frameworks
29-Apr
assessment/review
30-Apr Chapter 12 Quiz - Week 12 Quiz

1-May NIST Privacy Framework


Chapter 13 -
2-May Vulnerability HITRUST Common Security Framework
Week 13
Assessment and
5-May Data Security FEDRAMP
Week 13 discussed topics and frameworks
6-May
assessment/review
7-May Chapter 13 Quiz - Week 13 Quiz

8-May FISMA/FIPPs

9-May Chapter 14 - Risk Management Lifecycle


Week 14
Business
12-May Continuity COBIT / COSO
Week 14 discussed topics and frameworks Final Project: Simulate an attack and digital
13-May
assessment/review forensic process. Identify via tools such as
14-May Chapter 14 Quiz - Week 14 Quiz Nessus and Nmap, and exploit system
15-May
Review Chapter 1: Threats, Attacks, and vulnerabilities (e.g., using a backdoor or
Vulnerabilities - Domain 1 Questions command-and-control methods via Metasploit),
Chapter 15 - Risk Review Chapter 2: Technologies and Tools -
Week 15 16-May Mitigation then conduct a thorough investigation using
Domain 2 Questions
tools like Autopsy.
Review Chapter 3: Architecture and Design -
tools like Autopsy.
19-May
Domain 3 Questions
20-May Domain 1, 2 & 3 Answers and Explanations
21-May Chapter 15 Quiz - Week 15 Quiz
Review Chapter 4: Identity and Access
22-May
Management - Domain 4 Questions
Chapter 16 - Review Chapter 5: Risk Management - Domain 5
Week 16 23-May
Standards and Questions
26-May Frameworks Holiday: Monday May 26 Memorial Day
Review Chapter 6: Cryptography and PKI -
27-May
Domain 6 Questions
28-May Domain 4, 5 & 6 Answers and Explanations

Chapter 16 Quiz -
29-May Chapter 7: Practice Exam 1
Week 16 Quiz

Week 17 30-May Final Assessment

You might also like