Computer hardware and operating systems
Setting up a Raspberry Pi
Setting up a Linux virtual machine
Learn basic linux commands (and how to use man)
Overthewire BANDIT games as an exercise
Installing tools (like text editors)
Trying out text editors (Vim, Emacs, Nano) choose preferred with cheat sheets available
Conversion b/w binary, decimal, and hex
Character encodings (ASCII and Unicode)
Image encodings
Brief history overview
Using different types of crypto/ciphers
Methods of breaking classical ciphers
Symmetric/Asymmetric key encryption
Group exercise
Research project
Online tracking and advertising
Clickbait, fake news and misinformation
Common account and computer security principles
Social media and online behavior
Networking hardware
Common networking protocols
OSI Model/TCP-IP
How websites are designed and built
Common types of networking attacks
Social engineering
Network security
Using Wireshark to do packet analysis
What is digital forensics and who does it
What can be obtained through forensics
Legal issues with forensic work
Intro to programming with python (using Python3)
Light RE to introduce basic concepts (Given python programs and figuring out what they do)
VirusTotal (a tool to assist in analysis)
Blockchain, cryptocurrency and smart contracts
Artificial Intelligence
Quantum Computing
CompTIA IT Fundamentals Exam Review
What to do to continue learning about cybersecurity
<insert syllabus here>