| Class | Day | Date | Topic | |
| 1 | Saturday | 05/04/2025 | Course Overview + 1) Summarizing Fundamental Security Concepts + 2) Comparing Threat Types + 3) Explaining Appropriate Cryptographic Solutions | |
| 2 | Sunday | 06/04/2025 | 4) Implement Identity and Access Management + 5) Maintain Enterprise Campus Network Architecture + 6) Secure Cloud Network Architecture | |
| 3 | Saturday | 12/04/2025 (Songkran Day) | N/A | |
| 4 | Sunday | 13/04/2025 (Songkran Day) | N/A | |
| 5 | Saturday | 19/04/2025 | 7) Explain Resiliency and Site Security Concepts + 8) Explain Vulnerability Management + 9) Evaluate Network Security Capabilities | |
| 6 | Sunday | 20/04/2025 | 10) Assess Endpoint Security Capabilities + 11) Enhance Application Security Capabilities + 12) Explain Alerting and Monitoring Concepts | |
| 7 | Saturday | 03/05/2025 | 13) Analyze Indicators of Malicious Activity + 14) Summarize Security Governance Concepts + 15) Explain Risk Management Processes | |
| 8 | Sunday | 04/05/2025 | 16) Summarize Data Protection and Compliance Concepts + (Exam CompTIA Sec+ = KKU Exam) | |
| Lab#1 (Sec+) | Description (5-6 Labs each week) |
| #1 | 1) Exploring the Lab Environment |
| #2 | 2) Perform System Configuration Gap Analysis |
| #3 | 3) Configuring Examples of Security Control Types |
| #4 | 4) Finding Open Service Ports |
| #5 | 5) Using SET to Perform Social Engineering |
| #6 | 6) Using Storage Encryption |
| #7 | 7) Using Hashing and Salting |
| #8 | 8) Managing Password Security |
| #9 | 9) Managing Permissions |
| #10 | 10) Setting up Remote Access |
| #11 | 11) Using IPSec Tunneling |
| #12 | 12) Using Containers |
| #13 | 13) Using Virtualization |
| #14 | 14) Implementing Backups |
| #15 | 15) Performing Drive Sanitization |
| #16 | 16) Exploiting and Detecting SQLi |
| #17 | 17) Working with Threat Feeds |
| #18 | 18) Performing Vulnerability Scans |
| #19 | 19) Understanding Security Baselines |
| #20 | 20) Implementing a Firewall |
| #21 | 21) Using Group Policy |
| #22 | 22) Hardening |
| #23 | 23) Performing DNS Filtering |
| #24 | 24) Configuring System Monitoring |
| #25 | 25) Incident Response Detection |
| #26 | 26) Performing Digital Forensic |
| #27 | 27) Performing Root Cause Analysis |
| #28 | 28) Detecting and Responding to Malware |
| #29 | 29) Understanding On Path Attacks |
| #30 | 30) Using a Playbook |
| #31 | 31) Implementing Allow Lists and Deny Lists |
| #32 | 32) Performing Reconnaissance |
| #33 | 33) Performing Penetration Testing |
| #34 | 34) Training and Awareness through Simulation |
| #35 | 35) Use Cases of Automation and Scripting |
| #36 | 36) Using Network Sniffers |
| #37 | 37) Network Incident Investigation and Remediation |