- Introduction to Analyzing Threats
- Identifying Security Threats
- Mitigating Threats
- Threat Modeling
- Project: Insecure Juice Shop
- Introduction to the Analyst Role
- Core Frameworks and Principles
- Controls
- Defensible Network Architecture
- Project - Planning for Security Controls