Class | Day | Date | Topic | |
1 | Saturday | 05/04/2025 | Course Overview + 1) Summarizing Fundamental Security Concepts + 2) Comparing Threat Types + 3) Explaining Appropriate Cryptographic Solutions | |
2 | Sunday | 06/04/2025 | 4) Implement Identity and Access Management + 5) Maintain Enterprise Campus Network Architecture + 6) Secure Cloud Network Architecture | |
3 | Saturday | 12/04/2025 (Songkran Day) | N/A | |
4 | Sunday | 13/04/2025 (Songkran Day) | N/A | |
5 | Saturday | 19/04/2025 | 7) Explain Resiliency and Site Security Concepts + 8) Explain Vulnerability Management + 9) Evaluate Network Security Capabilities | |
6 | Sunday | 20/04/2025 | 10) Assess Endpoint Security Capabilities + 11) Enhance Application Security Capabilities + 12) Explain Alerting and Monitoring Concepts | |
7 | Saturday | 03/05/2025 | 13) Analyze Indicators of Malicious Activity + 14) Summarize Security Governance Concepts + 15) Explain Risk Management Processes | |
8 | Sunday | 04/05/2025 | 16) Summarize Data Protection and Compliance Concepts + (Exam CompTIA Sec+ = KKU Exam) | |
Lab#1 (Sec+) | Description (5-6 Labs each week) |
#1 | 1) Exploring the Lab Environment |
#2 | 2) Perform System Configuration Gap Analysis |
#3 | 3) Configuring Examples of Security Control Types |
#4 | 4) Finding Open Service Ports |
#5 | 5) Using SET to Perform Social Engineering |
#6 | 6) Using Storage Encryption |
#7 | 7) Using Hashing and Salting |
#8 | 8) Managing Password Security |
#9 | 9) Managing Permissions |
#10 | 10) Setting up Remote Access |
#11 | 11) Using IPSec Tunneling |
#12 | 12) Using Containers |
#13 | 13) Using Virtualization |
#14 | 14) Implementing Backups |
#15 | 15) Performing Drive Sanitization |
#16 | 16) Exploiting and Detecting SQLi |
#17 | 17) Working with Threat Feeds |
#18 | 18) Performing Vulnerability Scans |
#19 | 19) Understanding Security Baselines |
#20 | 20) Implementing a Firewall |
#21 | 21) Using Group Policy |
#22 | 22) Hardening |
#23 | 23) Performing DNS Filtering |
#24 | 24) Configuring System Monitoring |
#25 | 25) Incident Response Detection |
#26 | 26) Performing Digital Forensic |
#27 | 27) Performing Root Cause Analysis |
#28 | 28) Detecting and Responding to Malware |
#29 | 29) Understanding On Path Attacks |
#30 | 30) Using a Playbook |
#31 | 31) Implementing Allow Lists and Deny Lists |
#32 | 32) Performing Reconnaissance |
#33 | 33) Performing Penetration Testing |
#34 | 34) Training and Awareness through Simulation |
#35 | 35) Use Cases of Automation and Scripting |
#36 | 36) Using Network Sniffers |
#37 | 37) Network Incident Investigation and Remediation |