Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software,
Testing, Cryptography Diving right in with broad exposure to cybersecurity. This is an important opportunity to become comfortable with the list and dig into any areas that the student is not familiar with.
Controls, virtual machines, Windows or Mac, Linux, vulnerability assessment and remediation, penetration testing,
packet sniffing, cryptography.
Windows Directions Mac Directions
Scanning Networks Packet Sniffing