1. Introduction
  2. State of the art
  3. Analysis
  4. Actions
  5. Unit summary

  1. Introduction
  2. Detection
  3. Analysis
  4. General protections
  5. Unit summary

  1. Introduction
  2. Good practices
  3. Risk management and mitigating factors
  4. Threats and vulnerabilities
  5. Unit summary

  1. Introduction
  2. Definition and objectives
  3. Regulations
  4. Cybersecurity Management Systems
  5. Unit summary

  1. Introduction
  2. Security plan
  3. Safe development
  4. Cases
  5. Unit summary

  1. Introduction
  2. Identity management
  3. Authentication
  4. Authentication schemes
  5. Unit summary

  1. Introduction
  2. Threat models
  3. Assessment
  4. Risks
  5. Unit summary

  1. Introduction
  2. Management
  3. Active storage
  4. Passive storage
  5. Unit summary

  1. Introduction
  2. Types of social media
  3. Social media concepts
  4. Social media security
  5. Unit summary

  1. Introduction
  2. Social media threats
  3. Mitigating mechanisms
  4. Security tools
  5. Unit summary

  1. Introduction
  2. DOXING techniques
  3. SOCINT techniques
  4. Tools
  5. Unit summary

  1. Introduction
  2. Infoxication
  3. Information analysis
  4. Fake news detection techniques
  5. Unit summary

  1. Introduction
  2. Malware definition and types
  3. Static and dynamic analysis
  4. Terminology
  5. Unit summary

  1. Introduction
  2. Viruses and worms
  3. Trojans
  4. Spyware and Phising
  5. Unit summary

  1. Introduction
  2. Rootkits
  3. Ransomware
  4. Other types
  5. Unit summary

  1. Introduction
  2. Metasploit architecture
  3. Exploits
  4. Payloads
  5. Unit summary

  1. Introduction
  2. Principle of cryptography
  3. Classic algorithms (I)
  4. Classic algorithms (II)
  5. Enigma

  1. Introduction
  2. Principles of symmetric encryption
  3. Symmetric key algorithms
  4. Other symmetric algorithms
  5. Unit summary

  1. Introduction
  2. Asymmetric key algorithm
  3. Hash function and collisions
  4. Digital signature
  5. Unit summary

  1. Digital certificates
  2. Digital signature
  3. Tools and applications (I)
  4. Tools and applications (II)
  5. The future of cryptography

  1. Introduction
  2. Principle of cryptography
  3. Classic algorithms (I)
  4. Classic algorithms (II)
  5. Enigma

  1. Introduction
  2. Principles of symmetric encryption
  3. Symmetric key algorithms
  4. Other symmetric algorithms
  5. Unit summary

  1. Introduction
  2. Asymmetric key algorithm
  3. Hash function and collisions
  4. Digital signature
  5. Unit summary

  1. Digital certificates
  2. Digital signature
  3. Tools and applications (I)
  4. Tools and applications (II)
  5. The future of cryptography

  1. Introduction
  2. HTTP and HTTPS protocols
  3. Domains and DNS
  4. Servers
  5. Ports and other protocols

  1. Types of web threats
  2. Targets (I)
  3. Targets (II)
  4. Targets (III)
  5. Targets (IV)

  1. Introduction
  2. Cross-Site Scripting (XSS)
  3. SQL Injection
  4. Loss of authentication
  5. Other vulnerabilities

  1. Secure server
  2. Apache (I) Security
  3. Apache (II) Security
  4. NGINX
  5. Other measures

  1. What is Osint?
  2. Introduction to Osint
  3. Goals and levels
  4. Osint investigation methodology
  5. Social engineering

  1. Introduction to search engines
  2. Google search
  3. General search engines
  4. Other search engines
  5. Metasearch engines

  1. Specialized search engines
  2. Regular expressions
  3. Osint tools
  4. References
  5. Dark web

  1. Osint investgation
  2. Osint Workflow (I)
  3. Osint Workflow (II)
  4. Workflow Examples
  5. Automation and references

  1. Introduction to the Internet of Things (IoT)
  2. History of IoT
  3. SWOT analysis on IoT
  4. Areas and sectors
  5. IoT security and privacy

  1. Introduction to IoT architecture
  2. Layer models
  3. Specific architectures
  4. OpenFog
  5. IoT development

  1. IoT and Big Data
  2. IoT applications
  3. Analytics
  4. IoT analytics applications
  5. Data aggregation and integration

  1. Sensors
  2. Inter-sensor communication protocols, controllers, and interfaces
  3. Communication protocols
  4. Attacks and preventive measures
  5. Tools and case studies