| Number | Title | Materials |
|---|---|---|
| 1 | Introduction | slides |
| 2 | Vulnerabilities | slides |
| 3 | More Vulnerabilities | slides |
| 4 | Finishing Vulnerabilities | slides |
| 5 | Intro to Networks | slides |
| 6 | Intro to TCP | slides |
| 7 | Port Scanning | slides |
| 8 | More Port Scanning | slides |
| 9 | Worms | slides |
| 10 | Firewalls, IronStack Guest | slides, guest |
| 11 | Firewalls, DDOS | slides |
| 12 | Cornell ITSO Guest | slides |
| 13 | DDOS, NIDS | slides |
| 14 | NIDS, evasions | slides |
| 15 | HTTP, NIDS | slides |
| 16 | Javascript, Web Attacks | slides |
| 17 | Web Attacks | slides |
| 18 | More Web Attacks | slides |
| 19 | Proxies and XSS | slides |
| 20 | Finishing Web | slides |
| 21 | Symmetric Key Encryption | slides |
| 22 | Public Key Encryption | slides |
| 23 | Transport Layer Security (TLS) | slides |
| 24 | Review and Future | slides |
| 25 | Guest (Threat Intelligence) | slides |