-
Orientation
-
Phase ILecture - VirtualizationLecture - OS BasicsQuiz - Virtualization and OS BasicsAssignment - ILecture - ContainerizationLecture - Networking BasicsQuiz - Containerization and NetworkingLecture - OSI and TCP-IP ModelsLecture - Cybersecurity FundamentalsQuiz - OSI/TCP-IP & Cybersecurity BasicsLecture - Password CrackingLecture - Encryption and RansomwareQuiz - Encryption and RansomwareLecture - HTTP and HTTPSLecture - Network ProtocolsQuiz - HTTP/HTTPS & Network ProtocolsCTF - Unlock the PDFAI Interview 1Project - Discussion
-
Phase IILecture - Domain Name SystemLecture - DHCP and ICMPQuiz - DNS, DHCP, and ICMPLecture - Remote Access ProtocolsLecture - Network Scanning and AnalysisQuiz - Remote Access and ScanningLecture - Reconnaissance ToolkitLecture - Reconnaissance and Social Eng.Quiz - Reconnaissance and Social Eng.Lecture - Host SecurityLecture - Post ExploitationQuiz - Host Security and Post ExploitationLecture - Exploitation on Windows TargetLecture - Web Application Security [Part 1]Quiz - Windows Exploitation and Web Sec.CTF - Network Intel HuntAI Interview 2Project - Milestone I
-
Phase IIILecture - Web Application Security [Part 2]Lecture - Web Application Security [Part 3]Quiz - Web Application SecurityLecture - Web Application Security [Part 4]Lecture - Firewalls , VLANs, and VPNsQuiz - Web App Securtiy and FirewallsLecture - IAM: Authentication MethodsLecture - IAM: Access Control StrategiesQuiz - IAMLecture - Malware and its TypesLecture - Anti-Malware StrategiesQuiz - Malware and Anti-MalwareLecture - IDS/IPS SystemsLecture - Network MonitoringQuiz - IDS/IPS and Network MonitoringCTF - Ethical Hacking SimulationAI Interview 3Project - Milestone II
-
Phase IV
-
Schedule Sessions
-
Progress
5%