Unit 1 - Recursion | ||
Subunit 1 - Recursion | ||
| Recursion | Recursion / Base Case / Recursive Case / Call stack / Stack overflow / Backtracking / Stack / Unwinding / Return Address / Stack Frame / | |
Unit 1 - Case Study: Pentesting | ||
Subunit 1.1 - Pre-engagement planning | ||
| Introduction to the PTES framework | Pre-engagement / Intelligence gathering / Threat modeling / Vulnerability assessment / Exploitation / Post-exploitation / Reporting / Remediation / Retesting / Rules of engagement / | |
| Goal setting and target identification | Goal setting / Target identification / SMART criteria / Specific / Measurable / Achievable / Relevant / Time-bound / Milestones / Action plan / | |
| Scope and rules of engagement | Scope / Rules of Engagement (ROE) / Authorization / Escalation / Targeting / Prohibited actions / Allowed actions / Collateral damage / Non-combatants / Consent / Inventory assets / Classify assets / Document exclusions / Formal approvals / Review scope / Underscoping / False Sense of Security / Regulatory Non-Compliance / Overscoping / Scope Definition / Risk Assessment / | |
| Testing approaches | Unit testing / Integration testing / System testing / Acceptance testing / Regression testing / Test-driven development / Exploratory testing / Performance testing / Load testing / Smoke testing / Internal code structure / Code coverage / Internal code structure / Code coverage / Grey box testing / API testing / | |
Subunit 1.2 - Intelligence gathering | ||
| OSINT and data collection | OSINT / Public records / Social media analysis / Geolocation data / Metadata / Source verification / OSINT toolkit / Ethics in OSINT / Data provenance / Cross-verification / | |
| Social engineering reconnaissance | OSINT / Reconnaissance / Pretexting / Phishing / Spear phishing / Vishing / Baiting / Tailgating / Shoulder surfing / Dumpster diving / | |
| Reconnaissance techniques | Footprinting / OSINT / Banner grabbing / Port scanning / Enumeration / Active reconnaissance / Passive reconnaissance / Fingerprinting / Traceroute / DNS enumeration / | |
Subunit 1.3 - Threat modelling | ||
| Security prioritization | risk assessment / threat modeling / vulnerability / risk / impact / likelihood / controls / defense-in-depth / remediation / risk appetite / | |
| Asset valuation | Net asset value / Fair value / Market value / Book value / Replacement cost / Impairment / Depreciation / Amortization / Discounted cash flow / Salvage value / | |
| Exploitation methods | Phishing / SQL Injection / Man-in-the-Middle Attack / Social Engineering / Zero-Day Exploit / Buffer Overflow / Credential Stuffing / Drive-by Download / Supply Chain Attack / Cross-Site Scripting / | |
| Assess ingcapabilities and intentions | capability / competence / aptitude / capacity / reliability / motive / intention / deception / assessment / credibility / Opportunistic attackers / Commodity malware / Ransomware kits / Custom Exploits / Zero-Day Vulnerabilities / Attacker Intentions / Victimology / Payload Characteristics / Financial gain / Espionage / | |
| Identify adversaries | Adversary / Threat actor / Opponent / Antagonist / Rival / Enemy / Attacker / Intruder / Insider threat / Malicious actor / | |
Subunit 1.4 - Vulnerability analysis | ||
| Foundations of vulnerability identification and exploitability assessment | Misconfiguration / Zero-day exploit / CVE identifier / Vulnerability assessment / Security hardening / Risk assessment / | |
| Assessment approaches | Formative assessment / Summative assessment / Diagnostic assessment / Performance assessment / Authentic assessment / Portfolio assessment / Self-assessment / Peer assessment / Interim assessment / Adaptive assessment / | |
| Vulnerability identification | Threat modeling / Attack surface / Patch management / Privilege escalation / | |
Subunit 1.5 - Exploitation | ||
| Exploitation attempts | Phishing / SQL injection / Cross-site scripting (XSS) / Brute force attack / Man-in-the-middle attack / Buffer overflow / Privilege escalation / Zero-day exploit / Credential stuffing / Watering hole attack / | |
Subunit 1.6 - Post-exploitation and data handling | ||
| Maintaining control | Oversight / Regulation / Monitoring / Compliance / Risk management / Feedback loop / Standard operating procedure / Threshold / Delegation of authority / Contingency planning / | |
| Data extraction and privacy | Data minimization / Personal data / Consent / De-identification / Anonymization / Data controller / Data processor / Data breach / Right to erasure / Purpose limitation / | |
Subunit 1.7 - Reporting and documentation | ||
| Reporting findings | findings / conclusion / data / trend / evidence / implication / limitation / comparison / interpretation / recommendation / | |
| Ethical and regulatory considerations | Informed consent / Privacy / Data protection / Confidentiality / Conflict of interest / Compliance / Institutional Review Board (IRB) / Audit trail / Beneficence / Intellectual property rights / | |
Unit 2 - Abstract Data Structures | ||
Subunit 1 - Linked Lists | ||
| Linked Lists | Linked List / Contiguous Memory / Insertion / Deletion / node / pointer / dynamic memory usage / Singly Linked List / Doubly Linked List / Circular Linked List / Node / Doubly Linked List / Traversal / Round-Robin Scheduling / Circular Doubly Linked List / | |
Subunit 2 - Stacks | ||
| Stacks | Stack / Push / Pop / Peek / peek operation / | |
Subunit 3 - Queues | ||
| Queues | Circular Queue / rear pointer / isFull / head / Priority Queue / Peek / Enqueue / Dequeue / Peek / Enqueue / Dequeue / Peek / Enqueue / Dequeue / Peek / Task Scheduling / Print Queues / IO Buffers / Resource Sharing / | |
Subunit 4 - Trees | ||
| Binary Trees | binary tree / Binary Tree / Root / Node / Root / Leaf Node / Parent / Child / Siblings / Subtree / Depth / Full Binary Tree / Complete Binary Tree / Insertion / Deletion / Heap Data Structures / Huffman Coding / Traversal Algorithms / Decision Trees / Game Trees / Balanced Binary Tree / Unbalanced Binary Tree / Preorder Traversal / Inorder Traversal / Postorder Traversal / Level-order traversal / Breadth-first traversal / | |
| Non-binary trees | Non-binary tree / Hierarchical data / File systems / Organizational structures / Traversal techniques / General Tree / K-ary Tree / File Systems / | |
| Tree Traversal | Binary tree / Pre-order traversal / In-order traversal / Post-order traversal / Depth-first search / Breadth-first search / Binary search tree / | |
Subunit 5 - Object Oriented Programming | ||
| Object Oriented Programming | Encapsulation / Inheritance / Polymorphism / Class / Object-Oriented Programming (OOP) / Abstraction / constructor / method / Object / Private attributes / | |
Unit 3 - OS & System Management | ||
Subunit 1 - Processer Management | ||
| Measuring Processor Performance | Clock Speed / Instructions Per Cycle (IPC) / Cache Memory / Benchmarking / Thermal Design Power (TDP) / Overclocking / Response Time / Throughput / FLOPS (Floating-Point Operations Per Second) / Memory Bandwidth / Hyper-Threading / | |
| Pipelining | Processor Pipelining / Instruction Pipeline / Pipeline Hazard / Data Hazard / Structural Hazard / Pipeline Flush / Hazard / Stall / Branch Prediction / Speculative Execution / Instruction Reordering / | |
| Process Scheduling | First Come First Served Scheduling / Scheduling / Policy / Arrival Order / Execution Order / Preemptive / Non-preemptive / Task / Process / Arrival Time / Execution Time / Turnaround Time / Waiting Time / Context Switching / Starvation / Preemption / Burst Time / Round Robin Scheduling / Backfilling / Round Robin Process Scheduling / Time Quantum / Scheduling Algorithm / Non-preemptive / Scheduling Algorithm / | |
| Polling vs Interrupts | Polling / Interrupts / Interrupt Vector / Polling Loop / Interrupt Request (IRQ) / Interrupt Latency / Vectored Interrupts / Race condition / Deadlock / Concurrency / Thread / | |
Subunit 2 - Memory Management | ||
| Virtual Memory Paging | Virtual Memory / Paging / Page Table / Page Fault / Translation Lookaside Buffer / Swap Space / Frame / Memory Mapping / Thrashing / | |
| SRAM vs DRAM | SRAM / DRAM / Memory Cell / Refresh Rate / Access Time / Data Retention / Latency / | |
| Memory Performance Factors | Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth / | |
Subunit 3 - File System Management | ||
| File System Management | File System Management / File Allocation Table (FAT) / Directory / File Permissions / Disk Fragmentation / File Compression / Disk Quota / Mounting / Defragmentation / Compression / Fragment / Disk Optimization / Lossless Compression / Cluster / Data Integrity / File / Folder / Directory tree / Path / Root directory / Parent directory / Subdirectory / File extension / File system / Partitioning / Logical partition / Master boot record / Drive letter / | |
| RAID ( Redundant Array of Independent Disks) | Redundant Array of Independent Disks / Striping / Mirroring / Parity / RAID Level 0 / RAID Level 1 / RAID Level 5 / RAID Level 10 / | |
Subunit 3 - Device Management | ||
| Computer Screens | Screen Resolution / Refresh Rate / Pixel Density / Aspect Ratio / Framebuffer / Input Lag / Tearing / Interpolation / Motion Blur / Clarity / Immersion / User experience / Productivity / eye strain / | |
| Sound Cards | Sound Card / Digital Audio Converter (DAC) / Analog-to-Digital Converter (ADC) / Bit Depth / Sample Rate / MIDI Controller / External Sound Card / | |
| Peripheral Management | Peripheral Management / Hardware Interface / Device Driver / Plug and Play / Input Devices / Output Devices / Peripheral Configuration / Peripheral Compatibility / Peripheral Maintenance / Peripheral Troubleshooting / | |
Subunit 4 - User Interface Management | ||
| User Interface Management | Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options / | |
Subunit 5 - Virtualisation | ||
| Java Virtual Machine | Bytecode / Garbage Collection / JIT Compiler / ClassLoader / Stack / Execution Engine / Platform Independence / Security Manager / | |
| Hardware Virtualisation | Virtual Input Devices / Keyboard Emulation / Touchscreen Interface / Gesture Recognition / Virtual Reality Controllers / Motion Tracking Sensors / Eye Tracking Devices / Speech Recognition Software / Brain-Computer Interfaces / Haptic Feedback Devices / Virtual Drive / Disk Image / Mounting / ISO File / Partition / Emulation / Network Drive / File System / RAID / snapshot drives / ramdisk / cloud drive / snapshot / | |
| Virtual Machines | Hypervisor / Guest OS / Host OS / Virtualization / Snapshot / Provisioning / Cloning / Containerization / | |
Unit 4 - Monitoring and Control Systems | ||
Subunit 1 - Monitoring & Control Systems | ||
| Monitoring Systems and Their Applications | Temperature Sensor / Pressure Sensor / Proximity Sensor / Motion Sensor / Light Sensor / Humidity Sensor / Force Sensor / Chemical Sensor / Sound Sensor / Thermocouple / Thermistor / Tachometer / Accelerometer / Gyroscope / LDR / photodiode / | |
| Centralized and Distributed Systems | Centralised Control / Distributed System / Scalability / Reliability / Fault Tolerance / Latency / Data Consistency / Performance / Load Balancing / | |
| Control Systems | open loop control system / closed loop control system / feedback / reference input / error signal / controller / actuator / sensor / proportional control / integral control / PID control / Setpoint / Error / derivative / Electrical actuator / Solenoid / Stepper motor / Brushless DC motor / Linear actuator / Piezoelectric actuator / Servo motor / Pulse Width Modulation / | |
| PID Controllers | Proportional (P) / Integral (I) / Derivative (D) / Steady-State Error / | |
| Types of Actuators | ||
Subunit 2 - Automatic Control Systems | ||
| Control Mechanisms for Doors | Sensor / Actuator / Control Unit / Automatic Opening / Safety System / Access Control / Integration / Remote Control / Power Supply / User Interface / | |
| Control Systems for Elevators | Controller / Sensor / Microprocessor / Human-Machine Interface / Drive System / Load Sensor / Safety Brakes / Door Mechanism / Control Algorithm / Variable Frequency Drive / Proximity Sensor / Limit Switch / Infrared Sensor / Emergency Stop Switch / | |
| Understanding Traffic Light Systems | Traffic Signal / Cycle Time / Adaptive Control / Phase / Timing Plan / Sensor Data / Traffic Flow / | |
Subunit 4 - Industrial Systems | ||
| Process Control Systems | Process control systems / Sensors / Actuators / Feedback Control Systems / Setpoint / Feedforward control systems / Proportional control / Integral control / Derivative control / Real-Time Data Analysis / Industrial automation / Disturbances / | |
| Industrial Robotics Overview | Industrial robots / Automation / Artificial intelligence / Collaborative Robots (Cobots) / Articulated Robots / SCARA Robots / Robot Arm / End Effector / Sensors / Actuators / Control System / Open-loop System / Closed-loop System / Robot Simulation Software / Computer Vision / Object Detection / Safety Protocols / Regulatory Compliance / Risk Assessment / industrial robots / smart manufacturing / | |
Subunit 5 - Consumer Appliances | ||
| Heating Systems | Thermostat / Zoning / Boiler / Heat Pump / Control Strategy / Sensors / Actuator / Energy Management System / Smart Thermostat / On/Off Control Systems / Proportional Control Systems / PID Control Systems / Industrial Heating / Industrial Heating / Energy Efficiency / On/Off Control Systems / Temperature Sensors / Heating Control System / | |
| How Modern Washing Machines Work | Washing Machine / Control Systems / Microcontroller / Sensors / Actuators / Actuator / Electric Motors / Solenoids / Pressure Sensor / Temperature Sensor / Load Sensor / Self-diagnosis / | |
Subunit 6 - Transportation Systems | ||
| Introduction to GPS Technology | GPS / Satellite / Navigation / Coordinates / Waypoints / Tracking / Accuracy / Mapping / Geocaching / Receiver / Global Positioning System / Trilateration / Satellite Constellation / Time Synchronization / Geolocation / Route planning / Location-based services / Fleet management / Surveying / Fitness tracking / Agricultural applications / Atmospheric Interference / Clock errors / Atomic clock / A-GPS / satellite fixes / Multipath propagation / Signal reflection / Positioning accuracy / | |
| Taxi Meters | Fare calculation / Control Unit / GPS Integration / Mechanical Systems / Electronic Systems / GPS Integration / | |
Unit 6 - Advanced Databases & SQL | ||
Subunit 1 - Database Types (Higher) | ||
| Object Oriented Databases | Object Oriented Database / Object / Class / Inheritance / Encapsulation / Polymorphism / Association / Aggregation / Query Language / | |
| Database Segmentation | Database Segmentation / Segment / Segmentation Criteria / Segmentation Strategy / Data Type / Geographic Segmentation / Demographic Segmentation / Psychographic Segmentation / Behavioral Segmentation / Customer Segmentation / | |
| Multi-Dimensional Databases | Multi-dimensional databases / Dimensions / Cubes / Measures / Hierarchies / Slicing / Dicing / Roll-up / Drill-down / OLAP / | |
| Network Data Model | Network Data Model / Graph / Node / Edge / Attribute / Directed Graph / Undirected Graph / | |
| Spacial Database Model | Spatial Database / Geometric Data Types / Spatial Queries / Urban Planning / Environmental Monitoring / Transportation Systems / Point / Line / Polygon / Raster data model / Cell / Scalability / Distributed Data Storage / Real-time spatial data / Stream processing frameworks / Data Integration / Standardization / Performance Bottleneck / Spatial Index / | |
Subunit 2 - Data Science | ||
| Data Mining | Data mining / Pattern recognition / Clustering / Classification / Association rule mining / Machine learning / Data preprocessing / Decision tree / Feature selection / Big data / | |
| Deviation Detection | Deviation Detection / Data Integrity / Anomaly / Point Anomalies / Contextual Anomalies / Collective Anomalies / Quality Control / Transaction Monitoring / Traffic Analysis / Performance Monitoring / Collective Anomaly / Fraud Detection / Brute-Force Attack / | |
| Predictive Modelling | Predictive Modelling Process / Data Collection / Data Cleaning / Feature Selection / Model Training / Model Evaluation / Model Tuning / Deployment / Monitoring / Data Preparation / Cross-validation / Regression Analysis / Decision Tree / Random Forest / Support Vector Machine / Neural Network / Logistic Regression / K-Nearest Neighbors / Gradient Boosting / Time Series Forecasting / Ensemble Learning / | |
Subunit 3 - Data Warehousing | ||
| BI Dashboards | Business Intelligence (BI) dashboard / Key Performance Indicators (KPIs) / Data Visualization / | |
| Data Warehousing Architecture | ||
| The ETL Process | ETL Tool / | |
| Real Time Updates to Data Warehouses | ||