1 |
Introduction
Careers and Roles in Cybersecurity (CyberPDX)
Principles and Approaches
Access Control and Authorization
Linux
|
|
|
2 |
- Basics (command I/O, shell navigation, advanced files)
- Basics (regex, file utilities, network commands, processes)
|
Labs #1
|
|
3 |
- Access Control (permissions, setuid, sudo)
Applied cryptography
- Encoding, Hash functions, Message Authentication Codes
- Symmetric, Asymmetric (Public-Key) encryption
|
Labs #2
|
Labs #1
|
4 |
- Digital signatures, Certificates, Key exchange protocols, Perfect Forward Secrecy, Future Secrecy, Signal protocol
Authentication
- Password security, Multi-factor authentication
|
Labs #3
|
Labs #2
|
5 |
- FIDO/Passkeys (Passwordless authentication), Zero-trust and continuous authentication
- Social engineering (Spam, Phishing, Business Email Compromise, Scams, Fraud)
Network security I
- Data-link layer (802.11, WPA2)
|
Labs #4
|
Labs #3
|
6 |
- Data-link layer (ARP), Network layer (IP, CIDR, Sniffing, Spoofing, Hijacking)
- Network layer (DDoS, IPSec/VPNs, firewalls and filtering, network segmentation, network intelligence, ICMP)
|
Labs #5
|
Labs #4
|
7 |
Network security II
- Transport layer (TCP, TLS, certificate authorities and transparency, certificate revocation), Application layer: DNS security (DNS, DNSSEC)
- Application layer: DNS security (DoH, DoT, Oblivious DNS), E-mail security (SMTP/IMAP/POP over TLS, DKIM, SPF, DMARC)
Host security
- Host attacks (Initial access, Privilege escalation)
|
|
|
8 |
- Host attacks (Internal recon, Lateral movement, Persistence, Impact)
- Host defenses (IDS/IPS/EDR, signature detection, anomaly detection, blocklisting and allowlisting, Software signing, Virtualization and isolation techniques, File system backup and encryption)
Application security
|
Labs #6
|
Labs #5
|
9 |
- Programming language and CPU security, Memory corruption, Return-oriented Programming, Canaries, ASLR, Control-Flow Integrity
|
Labs #7
|
Labs #6
|
10 |
Privacy and anonymity security
- Privacy (OSINT, Do-not-track, Right to forget, Browser profiles, Cookies and super-cookies)
- Anonymity (Tor, Onion services, Dark Web)
|
Final project
|
|
Finals week |
Final project screencast
|
|
Labs #7
|