|
24 | 24 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-2/README.md", |
25 | 25 | "Lessons": [{ |
26 | 26 | "number": 1, |
27 | | - "name": "", |
| 27 | + "name": "Intro to Software Defined Environments", |
28 | 28 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-2/LESSON-1.md" |
29 | 29 | }, { |
30 | 30 | "number": 2, |
31 | | - "name": "", |
| 31 | + "name": "Intro to Micro Services", |
32 | 32 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-2/LESSON-2.md" |
33 | 33 | }, { |
34 | 34 | "number": 3, |
35 | | - "name": "", |
| 35 | + "name": "Build a Rails API & Deploy It", |
36 | 36 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-2/LESSON-3.md" |
37 | 37 | }] |
38 | 38 | }, { |
39 | 39 | "Week": 3, |
40 | | - "Title": "Security", |
| 40 | + "Title": "Attack the Weakling", |
41 | 41 | "Objectives": ["Deploy a Vulnerable application to AWS", "Attack the application using different techniques (e.g. OWASP Top 10)", "Explore security tools (e.g. Metasploit, NMap, SQLMap, BurpSuite ...etc)"], |
42 | 42 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-3/README.md", |
43 | 43 | "Lessons": [{ |
|
73 | 73 | }] |
74 | 74 | }, { |
75 | 75 | "Week": 5, |
76 | | - "Title": "Building a Rugged Application", |
| 76 | + "Title": "Build a Rugged App", |
77 | 77 | "Objectives": ["Service Oriented Architecture (SOA)", "Automated deployments with CloudFormation", "Whitelisting & Attack Maps"], |
78 | 78 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-5/README.md", |
79 | 79 | "Lessons": [{ |
|
91 | 91 | }] |
92 | 92 | }, { |
93 | 93 | "Week": 6, |
94 | | - "Title": "Rugged Security", |
| 94 | + "Title": "Red FTW!", |
95 | 95 | "Objectives": ["Account Takeovers", "Advanced cloud hacking techniques", "Lateral movement & privilege escalation"], |
96 | 96 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-6/README.md", |
97 | 97 | "Lessons": [{ |
|
109 | 109 | }] |
110 | 110 | }, { |
111 | 111 | "Week": 7, |
112 | | - "Title": "Rugged Operations", |
| 112 | + "Title": "Hunt the Attacker", |
113 | 113 | "Objectives": ["Restacking AWS Accounts", "Forensics in the Cloud", "Incident Response in the Cloud"], |
114 | 114 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-7/README.md", |
115 | 115 | "Lessons": [{ |
|
127 | 127 | }] |
128 | 128 | }, { |
129 | 129 | "Week": 8, |
130 | | - "Title": "Red Team vs Blue Team", |
| 130 | + "Title": "Capstone Project", |
131 | 131 | "Objectives": ["Put all your skills together", "Hack all the things", "Don't get caught by the Blue Team"], |
132 | 132 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-8/README.md", |
133 | 133 | "Lessons": [{ |
|
145 | 145 | }] |
146 | 146 | }, { |
147 | 147 | "Week": 9, |
148 | | - "Title": "Presentations", |
| 148 | + "Title": "Demos", |
149 | 149 | "Objectives": ["Problem-sovling", "Contribute to the open-source community", ""], |
150 | 150 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-9/README.md", |
151 | 151 | "Lessons": [{ |
|
0 commit comments