| 1. Week |
Cyber Security Standards and Compliance |
Research, Interview, Presentation (Preparation)
|
| 1. Week |
Cyber Security Standards and Compliance |
Research, Interview, Presentation (Preparation)
|
| 2. Week |
Applied Network Security |
Research, Interview, Presentation (Preparation)
|
| 2. Week |
Applied Network Security |
Research, Interview, Presentation (Preparation)
|
| 3. Week |
Applied Network Security |
Research, Interview, Presentation (Preparation)
|
| 3. Week |
Applied Network Security |
Research, Interview, Presentation (Preparation)
|
| 4. Week |
Application Security Policies / Practices |
Research, Interview, Presentation (Preparation)
|
| 4. Week |
Application Security Policies / Practices |
Research, Interview, Presentation (Preparation)
|
| 5. Week |
Application Security Policies / Practices |
Research, Interview, Presentation (Preparation)
|
| 5. Week |
Application Security Policies / Practices |
Research, Interview, Presentation (Preparation)
|
| 6. Week |
Cyber Operational Planning |
Research, Interview, Presentation (Preparation)
|
| 6. Week |
Cyber Operational Planning |
Research, Interview, Presentation (Preparation)
|
| 7. Week |
Software Security |
Research, Interview, Presentation (Preparation)
|
| 7. Week |
Software Security |
Research, Interview, Presentation (Preparation)
|
| 8. Week |
Cyber Security Risk Management and Compliance |
Research, Interview, Presentation (Preparation)
|
| 8. Week |
Cyber Security Risk Management and Compliance |
Research, Interview, Presentation (Preparation)
|
| 9. Week |
Mobile Device Management |
Research, Interview, Presentation (Preparation)
|
| 9. Week |
Mobile Device Management |
Research, Interview, Presentation (Preparation)
|
| 10. Week |
Secure Unix Management |
Research, Interview, Presentation (Preparation)
|
| 10. Week |
Secure Unix Management |
Research, Interview, Presentation (Preparation)
|
| 11. Week |
Secure Unix Management |
Research, Interview, Presentation (Preparation)
|
| 11. Week |
Secure Unix Management |
Research, Interview, Presentation (Preparation)
|
| 12. Week |
End User Device Security |
Research, Interview, Presentation (Preparation)
|
| 12. Week |
End User Device Security |
Research, Interview, Presentation (Preparation)
|
| 13. Week |
Security of IoT, Machine Learning Models |
Research, Interview, Presentation (Preparation)
|
| 13. Week |
Security of IoT, Machine Learning Models |
Research, Interview, Presentation (Preparation)
|
| 14. Week |
Implementing Artificial Intelligence in the Field of Cyber Security |
Research, Interview, Presentation (Preparation), Practice
|
| 14. Week |
Implementing Artificial Intelligence in the Field of Cyber Security |
Research, Interview, Presentation (Preparation), Practice
|