| Chapter | Topic | Lecture slides | Labs |
|---|---|---|---|
| 0 | Course Overview | Slides | Parrot OS(setup) |
| 1 | Professional | Slides | Pi Exam |
| 2 | Threats | Slides | Hacksplaining |
| 3 | Malware | Slides | DNS Exfiltration |
| 4 | Social Engineering | Slides | Phishing |
| 5 | Testing | Slides | HTB 2 million: foothold |
| 6 | Application | Slides | HTB 2 million: escalation Ghidra |
| 7 | Crypto | Slides | Blockchain Authentication SSH |
| 8 | Identity | Slides | Authentication Events Authentication OpenID |
| 9 | Physical | Slides | One Time Passwords |
| 10 | Virtualization | Slides | Docker STRIDE |
| 11 | Endpoint | Slides | Internet Scanning |
| 12 | Network | Slides | Google's Gruyere The Onion Router (TOR) |
| 13 | Wireless | Slides | Wireshark |
| 14 | Monitoring | Slides | Chromium Policy |
| 15 | Forensics | Slides | Rhino Hunt |
| 16 | GRC | Slides | Cloud OpSec |
| 17 | Risk-Privacy | Slides | HTB Redux(PermX) |