Unit 1 - Recursion

Subunit 1 - Recursion

Recursion Recursion / Base Case / Recursive Case / Call stack / Stack overflow / Backtracking / Stack / Unwinding / Return Address / Stack Frame /

Unit 1 - Case Study: Pentesting

Subunit 1.1 - Pre-engagement planning

Introduction to the PTES framework Pre-engagement / Intelligence gathering / Threat modeling / Vulnerability assessment / Exploitation / Post-exploitation / Reporting / Remediation / Retesting / Rules of engagement /
Goal setting and target identification Goal setting / Target identification / SMART criteria / Specific / Measurable / Achievable / Relevant / Time-bound / Milestones / Action plan /
Scope and rules of engagement Scope / Rules of Engagement (ROE) / Authorization / Escalation / Targeting / Prohibited actions / Allowed actions / Collateral damage / Non-combatants / Consent / Inventory assets / Classify assets / Document exclusions / Formal approvals / Review scope / Underscoping / False Sense of Security / Regulatory Non-Compliance / Overscoping / Scope Definition / Risk Assessment /
Testing approaches Unit testing / Integration testing / System testing / Acceptance testing / Regression testing / Test-driven development / Exploratory testing / Performance testing / Load testing / Smoke testing / Internal code structure / Code coverage / Internal code structure / Code coverage / Grey box testing / API testing /

Subunit 1.2 - Intelligence gathering

OSINT and data collection OSINT / Public records / Social media analysis / Geolocation data / Metadata / Source verification / OSINT toolkit / Ethics in OSINT / Data provenance / Cross-verification /
Social engineering reconnaissance OSINT / Reconnaissance / Pretexting / Phishing / Spear phishing / Vishing / Baiting / Tailgating / Shoulder surfing / Dumpster diving /
Reconnaissance techniques Footprinting / OSINT / Banner grabbing / Port scanning / Enumeration / Active reconnaissance / Passive reconnaissance / Fingerprinting / Traceroute / DNS enumeration /

Subunit 1.3 - Threat modelling

Security prioritization risk assessment / threat modeling / vulnerability / risk / impact / likelihood / controls / defense-in-depth / remediation / risk appetite /
Asset valuation Net asset value / Fair value / Market value / Book value / Replacement cost / Impairment / Depreciation / Amortization / Discounted cash flow / Salvage value /
Exploitation methods Phishing / SQL Injection / Man-in-the-Middle Attack / Social Engineering / Zero-Day Exploit / Buffer Overflow / Credential Stuffing / Drive-by Download / Supply Chain Attack / Cross-Site Scripting /
Assess ingcapabilities and intentions capability / competence / aptitude / capacity / reliability / motive / intention / deception / assessment / credibility / Opportunistic attackers / Commodity malware / Ransomware kits / Custom Exploits / Zero-Day Vulnerabilities / Attacker Intentions / Victimology / Payload Characteristics / Financial gain / Espionage /
Identify adversaries Adversary / Threat actor / Opponent / Antagonist / Rival / Enemy / Attacker / Intruder / Insider threat / Malicious actor /

Subunit 1.4 - Vulnerability analysis

Foundations of vulnerability identification and exploitability assessment Misconfiguration / Zero-day exploit / CVE identifier / Vulnerability assessment / Security hardening / Risk assessment /
Assessment approaches Formative assessment / Summative assessment / Diagnostic assessment / Performance assessment / Authentic assessment / Portfolio assessment / Self-assessment / Peer assessment / Interim assessment / Adaptive assessment /
Vulnerability identification Threat modeling / Attack surface / Patch management / Privilege escalation /

Subunit 1.5 - Exploitation

Exploitation attempts Phishing / SQL injection / Cross-site scripting (XSS) / Brute force attack / Man-in-the-middle attack / Buffer overflow / Privilege escalation / Zero-day exploit / Credential stuffing / Watering hole attack /

Subunit 1.6 - Post-exploitation and data handling

Maintaining control Oversight / Regulation / Monitoring / Compliance / Risk management / Feedback loop / Standard operating procedure / Threshold / Delegation of authority / Contingency planning /
Data extraction and privacy Data minimization / Personal data / Consent / De-identification / Anonymization / Data controller / Data processor / Data breach / Right to erasure / Purpose limitation /

Subunit 1.7 - Reporting and documentation

Reporting findings findings / conclusion / data / trend / evidence / implication / limitation / comparison / interpretation / recommendation /
Ethical and regulatory considerations Informed consent / Privacy / Data protection / Confidentiality / Conflict of interest / Compliance / Institutional Review Board (IRB) / Audit trail / Beneficence / Intellectual property rights /

Unit 2 - Abstract Data Structures

Subunit 1 - Linked Lists

Linked Lists Linked List / Contiguous Memory / Insertion / Deletion / node / pointer / dynamic memory usage / Singly Linked List / Doubly Linked List / Circular Linked List / Node / Doubly Linked List / Traversal / Round-Robin Scheduling / Circular Doubly Linked List /

Subunit 2 - Stacks

Stacks Stack / Push / Pop / Peek / peek operation /

Subunit 3 - Queues

Queues Circular Queue / rear pointer / isFull / head / Priority Queue / Peek / Enqueue / Dequeue / Peek / Enqueue / Dequeue / Peek / Enqueue / Dequeue / Peek / Task Scheduling / Print Queues / IO Buffers / Resource Sharing /

Subunit 4 - Trees

Binary Trees binary tree / Binary Tree / Root / Node / Root / Leaf Node / Parent / Child / Siblings / Subtree / Depth / Full Binary Tree / Complete Binary Tree / Insertion / Deletion / Heap Data Structures / Huffman Coding / Traversal Algorithms / Decision Trees / Game Trees / Balanced Binary Tree / Unbalanced Binary Tree / Preorder Traversal / Inorder Traversal / Postorder Traversal / Level-order traversal / Breadth-first traversal /
Non-binary trees Non-binary tree / Hierarchical data / File systems / Organizational structures / Traversal techniques / General Tree / K-ary Tree / File Systems /
Tree Traversal Binary tree / Pre-order traversal / In-order traversal / Post-order traversal / Depth-first search / Breadth-first search / Binary search tree /

Subunit 5 - Object Oriented Programming

Object Oriented Programming Encapsulation / Inheritance / Polymorphism / Class / Object-Oriented Programming (OOP) / Abstraction / constructor / method / Object / Private attributes /

Unit 3 - OS & System Management

Subunit 1 - Processer Management

Measuring Processor Performance Clock Speed / Instructions Per Cycle (IPC) / Cache Memory / Benchmarking / Thermal Design Power (TDP) / Overclocking / Response Time / Throughput / FLOPS (Floating-Point Operations Per Second) / Memory Bandwidth / Hyper-Threading /
Pipelining Processor Pipelining / Instruction Pipeline / Pipeline Hazard / Data Hazard / Structural Hazard / Pipeline Flush / Hazard / Stall / Branch Prediction / Speculative Execution / Instruction Reordering /
Process Scheduling First Come First Served Scheduling / Scheduling / Policy / Arrival Order / Execution Order / Preemptive / Non-preemptive / Task / Process / Arrival Time / Execution Time / Turnaround Time / Waiting Time / Context Switching / Starvation / Preemption / Burst Time / Round Robin Scheduling / Backfilling / Round Robin Process Scheduling / Time Quantum / Scheduling Algorithm / Non-preemptive / Scheduling Algorithm /
Polling vs Interrupts Polling / Interrupts / Interrupt Vector / Polling Loop / Interrupt Request (IRQ) / Interrupt Latency / Vectored Interrupts / Race condition / Deadlock / Concurrency / Thread /

Subunit 2 - Memory Management

Virtual Memory Paging Virtual Memory / Paging / Page Table / Page Fault / Translation Lookaside Buffer / Swap Space / Frame / Memory Mapping / Thrashing /
SRAM vs DRAM SRAM / DRAM / Memory Cell / Refresh Rate / Access Time / Data Retention / Latency /
Memory Performance Factors Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth /

Subunit 3 - File System Management

File System Management File System Management / File Allocation Table (FAT) / Directory / File Permissions / Disk Fragmentation / File Compression / Disk Quota / Mounting / Defragmentation / Compression / Fragment / Disk Optimization / Lossless Compression / Cluster / Data Integrity / File / Folder / Directory tree / Path / Root directory / Parent directory / Subdirectory / File extension / File system / Partitioning / Logical partition / Master boot record / Drive letter /
RAID ( Redundant Array of Independent Disks) Redundant Array of Independent Disks / Striping / Mirroring / Parity / RAID Level 0 / RAID Level 1 / RAID Level 5 / RAID Level 10 /

Subunit 3 - Device Management

Computer Screens Screen Resolution / Refresh Rate / Pixel Density / Aspect Ratio / Framebuffer / Input Lag / Tearing / Interpolation / Motion Blur / Clarity / Immersion / User experience / Productivity / eye strain /
Sound Cards Sound Card / Digital Audio Converter (DAC) / Analog-to-Digital Converter (ADC) / Bit Depth / Sample Rate / MIDI Controller / External Sound Card /
Peripheral Management Peripheral Management / Hardware Interface / Device Driver / Plug and Play / Input Devices / Output Devices / Peripheral Configuration / Peripheral Compatibility / Peripheral Maintenance / Peripheral Troubleshooting /

Subunit 4 - User Interface Management

User Interface Management Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options /

Subunit 5 - Virtualisation

Java Virtual Machine Bytecode / Garbage Collection / JIT Compiler / ClassLoader / Stack / Execution Engine / Platform Independence / Security Manager /
Hardware Virtualisation Virtual Input Devices / Keyboard Emulation / Touchscreen Interface / Gesture Recognition / Virtual Reality Controllers / Motion Tracking Sensors / Eye Tracking Devices / Speech Recognition Software / Brain-Computer Interfaces / Haptic Feedback Devices / Virtual Drive / Disk Image / Mounting / ISO File / Partition / Emulation / Network Drive / File System / RAID / snapshot drives / ramdisk / cloud drive / snapshot /
Virtual Machines Hypervisor / Guest OS / Host OS / Virtualization / Snapshot / Provisioning / Cloning / Containerization /

Unit 4 - Monitoring and Control Systems

Subunit 1 - Monitoring & Control Systems

Monitoring Systems and Their Applications Temperature Sensor / Pressure Sensor / Proximity Sensor / Motion Sensor / Light Sensor / Humidity Sensor / Force Sensor / Chemical Sensor / Sound Sensor / Thermocouple / Thermistor / Tachometer / Accelerometer / Gyroscope / LDR / photodiode /
Centralized and Distributed Systems Centralised Control / Distributed System / Scalability / Reliability / Fault Tolerance / Latency / Data Consistency / Performance / Load Balancing /
Control Systems open loop control system / closed loop control system / feedback / reference input / error signal / controller / actuator / sensor / proportional control / integral control / PID control / Setpoint / Error / derivative / Electrical actuator / Solenoid / Stepper motor / Brushless DC motor / Linear actuator / Piezoelectric actuator / Servo motor / Pulse Width Modulation /
PID Controllers Proportional (P) / Integral (I) / Derivative (D) / Steady-State Error /
Types of Actuators

Subunit 2 - Automatic Control Systems

Control Mechanisms for Doors Sensor / Actuator / Control Unit / Automatic Opening / Safety System / Access Control / Integration / Remote Control / Power Supply / User Interface /
Control Systems for Elevators Controller / Sensor / Microprocessor / Human-Machine Interface / Drive System / Load Sensor / Safety Brakes / Door Mechanism / Control Algorithm / Variable Frequency Drive / Proximity Sensor / Limit Switch / Infrared Sensor / Emergency Stop Switch /
Understanding Traffic Light Systems Traffic Signal / Cycle Time / Adaptive Control / Phase / Timing Plan / Sensor Data / Traffic Flow /

Subunit 4 - Industrial Systems

Process Control Systems Process control systems / Sensors / Actuators / Feedback Control Systems / Setpoint / Feedforward control systems / Proportional control / Integral control / Derivative control / Real-Time Data Analysis / Industrial automation / Disturbances /
Industrial Robotics Overview Industrial robots / Automation / Artificial intelligence / Collaborative Robots (Cobots) / Articulated Robots / SCARA Robots / Robot Arm / End Effector / Sensors / Actuators / Control System / Open-loop System / Closed-loop System / Robot Simulation Software / Computer Vision / Object Detection / Safety Protocols / Regulatory Compliance / Risk Assessment / industrial robots / smart manufacturing /

Subunit 5 - Consumer Appliances

Heating Systems Thermostat / Zoning / Boiler / Heat Pump / Control Strategy / Sensors / Actuator / Energy Management System / Smart Thermostat / On/Off Control Systems / Proportional Control Systems / PID Control Systems / Industrial Heating / Industrial Heating / Energy Efficiency / On/Off Control Systems / Temperature Sensors / Heating Control System /
How Modern Washing Machines Work Washing Machine / Control Systems / Microcontroller / Sensors / Actuators / Actuator / Electric Motors / Solenoids / Pressure Sensor / Temperature Sensor / Load Sensor / Self-diagnosis /

Subunit 6 - Transportation Systems

Introduction to GPS Technology GPS / Satellite / Navigation / Coordinates / Waypoints / Tracking / Accuracy / Mapping / Geocaching / Receiver / Global Positioning System / Trilateration / Satellite Constellation / Time Synchronization / Geolocation / Route planning / Location-based services / Fleet management / Surveying / Fitness tracking / Agricultural applications / Atmospheric Interference / Clock errors / Atomic clock / A-GPS / satellite fixes / Multipath propagation / Signal reflection / Positioning accuracy /
Taxi Meters Fare calculation / Control Unit / GPS Integration / Mechanical Systems / Electronic Systems / GPS Integration /

Unit 6 - Advanced Databases & SQL

Subunit 1 - Database Types (Higher)

Object Oriented Databases Object Oriented Database / Object / Class / Inheritance / Encapsulation / Polymorphism / Association / Aggregation / Query Language /
Database Segmentation Database Segmentation / Segment / Segmentation Criteria / Segmentation Strategy / Data Type / Geographic Segmentation / Demographic Segmentation / Psychographic Segmentation / Behavioral Segmentation / Customer Segmentation /
Multi-Dimensional Databases Multi-dimensional databases / Dimensions / Cubes / Measures / Hierarchies / Slicing / Dicing / Roll-up / Drill-down / OLAP /
Network Data Model Network Data Model / Graph / Node / Edge / Attribute / Directed Graph / Undirected Graph /
Spacial Database Model Spatial Database / Geometric Data Types / Spatial Queries / Urban Planning / Environmental Monitoring / Transportation Systems / Point / Line / Polygon / Raster data model / Cell / Scalability / Distributed Data Storage / Real-time spatial data / Stream processing frameworks / Data Integration / Standardization / Performance Bottleneck / Spatial Index /

Subunit 2 - Data Science

Data Mining Data mining / Pattern recognition / Clustering / Classification / Association rule mining / Machine learning / Data preprocessing / Decision tree / Feature selection / Big data /
Deviation Detection Deviation Detection / Data Integrity / Anomaly / Point Anomalies / Contextual Anomalies / Collective Anomalies / Quality Control / Transaction Monitoring / Traffic Analysis / Performance Monitoring / Collective Anomaly / Fraud Detection / Brute-Force Attack /
Predictive Modelling Predictive Modelling Process / Data Collection / Data Cleaning / Feature Selection / Model Training / Model Evaluation / Model Tuning / Deployment / Monitoring / Data Preparation / Cross-validation / Regression Analysis / Decision Tree / Random Forest / Support Vector Machine / Neural Network / Logistic Regression / K-Nearest Neighbors / Gradient Boosting / Time Series Forecasting / Ensemble Learning /

Subunit 3 - Data Warehousing

BI Dashboards Business Intelligence (BI) dashboard / Key Performance Indicators (KPIs) / Data Visualization /
Data Warehousing Architecture
The ETL Process ETL Tool /
Real Time Updates to Data Warehouses