| 1 | Introduction Careers and Roles in Cybersecurity (CyberPDX)
 Principles and Approaches
 Access Control and Authorization
 Linux
 
 | Labs #1 (Setup) |  | 
              
                | 2 | 
                    Basics (command I/O, shell navigation, advanced files)Basics (regex, file utilities, network commands, processes)Access Control (subjects, objects, permissions) | Labs #2 (Linux) | Labs #1 | 
              
                | 3 | 
                    Applied cryptographyAccess Control (setuid, sudo) 
                    Encoding, Symmetric encryption, Hash functions, Message Authentication Codes, Symmetric, Asymmetric (Public-Key) encryptionDigital signatures, Protocols, Diffie-Hellman, TLS, Certificates |  |  | 
              
                | 4 | 
                    AuthenticationTLS issues, Perfect Forward Secrecy, Future Secrecy, Signal protocol 
                    Password security, Multi-factor authenticationFIDO/Passkeys (Passwordless authentication), Zero-trust and continuous authentication | Labs #3 (Cryptography) | Labs #2 | 
              
                | 5 | 
                    Network securitySocial engineering (Spam, Phishing, Business Email Compromise, Scams, Fraud) 
                    Data-link layer (802.11, WPA2, ARP), Network layer (IP) | Labs #4 (Authentication) | Labs #3 | 
              
                | 6 | 
                    Network layer (CIDR, Sniffing, Spoofing, Hijacking, DDoS, IPSec/VPNs, firewalls and filtering)Network layer (network segmentation, network intelligence, ICMP), Transport layer (TCP) | Labs #5 (Network security) | Labs #4 | 
              
                | 7 | 
                    Host securityApplication layer: DNS security (DNS, DNSSEC)Application layer: DNS security (DoH, DoT, Oblivious DNS), E-mail security (SMTP/IMAP/POP over TLS, DKIM, SPF, DMARC) 
                    Host attacks (Initial access, Privilege escalation)Host attacks (Internal recon, Lateral movement, Persistence, Impact) |  |  | 
              
                | 8 | 
                    Application securityHost defenses (IDS/IPS/EDR, signature detection, anomaly detection, blocklisting and allowlisting, Software signing, Virtualization and isolation techniques, File system backup and encryption) | Labs #6 (Host security) | Labs #5 | 
              
                | 9 | 
                    Programming language and CPU security, Memory corruption, Return-oriented Programming, Canaries, ASLR, Control-Flow Integrity | Labs #7 (Application security, Privacy) | Labs #6 | 
              
                | 10 | Privacy and anonymity security 
                    Privacy (OSINT, Right to forget, Browser profiles, Cookies and super-cookies)Anonymity (Tor, Onion services, Dark Web) | Final project |  | 
              
              
                | Finals week | Final project screencast |  | Labs #7 (Monday)
                Final screencast (Friday, 6/13 11:59pm) |