MaccGenics Notes
Search
CTRL + K
MaccGenics Notes
Search
CTRL + K
00 - TAMU Brain
5th Semester (Fall 25)
CSCE-312
Ex1
Digital Logic Design 2
Digital Logic Design
Karnaugh Maps
Ex2
Machine-Level Programming I - Basics
Machine-Level Programming II - Control
Machine-Level Programming III - Procedures
Ex3
Machine-Level Programming IV - Data
Machine-Level Programming V - Advanced Topics
Program Optimization
Ex4
Cache Memories
The Memory Hierarchy
Virtual Memory - Concepts
HWs
HW 02 - CMOS Full Adder - Learnings
HW 03 - Bits and Bytes
Labs
08-28-25 Lab 1
09-02-25 Lab 2
09-04-25 Lab 3
09-09-25 Lab 4
09-11-25 Lab 5
09-16-25 Lab 6
09-18-25 Lab 7
09-23-25 Lab 8
09-30-25 Lab 10
10-02-25 Lab 11
10-23-25 Lab 12
Machine Language - Procedures & Recursion
Machine Language - x86 Assembly
CSCE-312
CSCE-314
Ex1
ADTs, Pattern Matching, Tuples, Guards
History & Functional Programming Primer
Laziness and Infinite Structures
Polymorphism, type classes, maybe, either
Recursion, Higher-Order Functions, Lambdas, Currying, Lists
Trees in Functional Programming
In-class
In-class-2
In-class-3
In-class-4
In-class-5
In-class-6
In-class-7 Test Review 1
Concurrency, Threads, Synchronization, and Deadlocks
Exceptions, Generics, and Collections in Java
Functional Reflection in Java
Inheritance, Polymorphism, and Interfaces
Model-View-Controller (MVC) and JavaFX
Object-Oriented Programming (Java)
GEOL-101
Ch. 1 - Intro to Geology
Ch. 10 - Crustal Deformation
Ch. 11 - Earthquakes and Earthquake Hazards
Ch. 12 - Earth's Interior
Ch. 13 - Origin and Evolution of the Ocean Floor
Ch. 14 - Mountain Building
Ch. 15 - Mass Movement-The Work of Gravity
Ch. 16 - Running Water
Ch. 17 - Groundwater
Ch. 18 - Glaciers and Glaciation
Ch. 2 - Plate Tectonics
Ch. 21 - Global Climate Change
Ch. 22 - Earth's Evolution Through Geologic Time
Ch. 23 - Energy and Mineral Resources
Ch. 3 - Matter and Minerals
Ch. 4 - Igneous Rocks and Intrusive Activity
Ch. 5 - Volcanoes and Volcanic Hazards
Ch. 6 - Weathering and Soils
Ch. 7 - Sedimentary Rocks
Ch. 8 - Metamorphism and Metamorphic Rocks
Ch. 9 - Geologic Time
PHIL-282
Research
Research Proposal
AI Ethics
Aristotle - Nicomachean Ethics
Cybersecurity and Cyberwar - what everyone needs to know
Democracy in the Digital Public Sphere
Individual or Instrument - GenAI's Current Place in the Art and Intellectual Property Worlds
Jurgen Habermas I - What Is Meant by 'Deliberative Democracy'? Objections and Misunderstandings. (p.81-103)
Jurgen Habermas II - Deliberative Democracy - An Interview (p.60-80)
Jurgen Habermas III - Reflections and Conjectures (p.1-21)
Jurgen Habermas IV (p.22-40)
Jurgen Habermas V - (p.41-59)
Kristen Worden Disengagement in the Digital Age
Liars and Outliers
Moral Machines - From Value Alignment to Embodied Virtue
New Social Media and Virtues
Privacy, Play, and the Digitalization of the University
Response 1
Response 10
Response 2
Response 3
Response 4
Response 5
Response 6
Response 7
Response 8
Response 9
Technology and Ethics
The Age of Surveillance Capitalism
STAT-211
HWs
HW 01
HW 02
Introduction to R
2 - Vectors in R
Midterm 1
Ch. 0 - Intro to Statistics
Ch. 1 - Statistical Concepts
Ch. 2 - Introduction to Probability
Ch. 3 - Continuous Distributions
Ch. 3 - Discrete Distributions
Midterm 2
Ch. 4 - Joint Distribution of Random Variables
5th Semester (Fall 2025)
01 - Work (Chamba)
CAP
Network+
1. Networking - A Structured Approach
Authentication and Integrity
Common Ports and Services
Layer 1
Layer 2
Layer 3
Layer 4
Layers 5-7
Networking - A structured Approach
The OSI Model
2. Network Components
Additional Devices
Firewalls
Hubs and Switches
Intrusion Detection - Prevention
Load Balancers
Network Components
Routers and Modems
Storage Controller
VPN Concentrator
Wireless LANs
3. Network Topologies
CAN
Dynamic Multipoint Virtual Private Network
Hardware VPN Clients
LAN
MAN
Network Topologies
PAN
Peer-to-peer, Point-to-point, and Beyond
Remote Access VPN
Site-to-Site VPN
Split Tunneling vs. Full Tunneling
Star, Hub, Mesh, Bus, Ring
Virtual Private Network (VPN)
VLAN
WAN
WLAN
4. Network Services
DNSCrypt
DNSsec
Domain Name Service (DNS)
Dynamic Host Configuration Protocol (DHCP)
File Transfer Protocol - SFTP - TFTP
GRE
HTTP(S)
ICMP
IP
IPsec
LDAP(S)
NetFlow & IPFIX
Network Address Translation (NAT)
Network Services
Network Time Protocol (NTP)
POP3(S) - IMAP(S)
RADIUS
Session Initiation Protocol
SMTP(S)
SNMP
Software-Defined Networking
SQL - SQLnet - MySQL
Syslog
TACACS+
TCP
Telnet and Secure Shell (SSH)
UDP
VNC - RDP
Voice Over IP Intro
5. WAN Technologies
ATM
Cable Modem
Cellular Technologies
Frame Relay - ISDN - DSL
Metro-Ethernet
MPLS (Multiprotocol Label Switching)
Packet Switching vs. Circuit Switching
Satellite
WAN Technologies
6. Network Cables and Connectors
Cabling Tools
Copper Cable
Copper Connectors
Crossover Cables
Fiber Cable
Fiber Connectors
Media Converters
Network Cables and Connectors
Termination Points and EIA-TIA Wiring Standards
7. Ethernet Switch Operation
Broadcast Storms - Loop Prevention
Distributed Switching
Ethernet Switch operation
Link Aggregation
Port Mirroring for Traffic Analysis
Spanning Tree Protocol (STP)
Spanning Tree Protocol Advanced
STP Performance Tuning and Troubleshooting
Switch Forwarding Logic (Unicast, Multicast, Broadcast)
Trunking
VLAN Configuration
8. Wireless LAN
RF Primer
Wireless Access Point (WAP)
Wireless LAN Antennas
Wireless LAN Security
Wireless LAN Standards
Wireless LAN
Wireless Router Setup
Wireless Site Survey
Wireless Troubleshooting
9. IPv4 Network Addressing
Anycast
Binary Introduction
Classless Interdomain Routing (CIDR)
Directed Broadcast
Hexadecimal Introduction
IP Address management (IPAM)
IPv4 Addresses
IPv4 Network Addressing
Loopback Addressing
MAC Addresses
Multicast
NAT - PAT - Overload
Private Addresses
Public Addresses
Subnetting Exercises
Subnetting Operations
10. IPv6 Networks
Coexisting with IPv4
Dual Stack (IPv4 & IPv6)
EUI-64
Global Unicast
Hierarchical Routing
IPv6 Address Format
IPv6 Address Planning
IPv6 in the Real World
IPv6 Networks
IPv6 Security
IPv6 Tunneling
Link Local Address
Stateless Address Auto-Configuration (SLAAC)
11. IP Routing
Border Gateway Protocol (BGP) - Introduction
Enhanced Interior Gateway Routing Protocol (EIGRP)
Exterior Border Gateway Protocol (eBGP)
Gateway Redundancy
Intelligent Forwarding Operations
Interior Border Gateway Protocol (iBGP)
IP Routing
Open Shortest Path First (OSPF)
OSPF Areas
Route Redistribution
Routing Information Protocol (RIP)
12. Unified Communications Funcamentals
Classification and Marking
Congestion Management
QoS - Introduction
Service Level Agreements
Traffic Shaping and Policing
UC Challenges
UC Products and Solutions
Unified Communications Fundamentals
Unified Communications Introduction
VoIP Suite of Protocols
14. Network Security
DDoS Attacks
DNS Records Cheat Sheet
IEEE Specifications Cheat Sheet
Network+
Port Numbers Cheat Sheet
Security+
M10 - Third-party Vendor Risks
Contracts and Agreements
M10 Practice Quiz
Supply Chain Attacks
Supply Chain Risks
Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)
Third-Party Vendor Risks
Vendor Assessment
Vendor Selection and Monitoring
M11 - Governance and Compliance
Compliance
Governance and Compliance (OBJ 5.1 & 5.4)
Governance and Compliance
Governance considerations
Governance Structures
Governance
M11 Practice Quiz
Non-compliance Consequences
Policies
Procedures
Standards
M12 - Asset and Change Management
Acquisition and Procurement
Asset and Change Management (OBJ 1.3, 4.1 & 4.2)
Asset and Change Management
Asset Disposal and Decommissioning
Asset Management
Change Management Process
Change Management
Documenting Changes
M12 Practice Quiz
Mobile Asset Deployments
Technical Implications of Changes
M13 - Audits and Assessments
Attestation of Findings
Audits and Assessments (OBJ 5.5)
Audits and Assessments
External Audits and Assessments
Internal Audits and Assessments
M13 Practice Quiz
Penetration Testing
Performing a Basic PenTest
Reconnaissance in Pentesting
M14 - Cyber Resilience and Redundancy
Capacity Planning
Continuity of Operations Plan
Cyber Resilience and Redundancy (OBJ 3.4)
Cyber Resilience and Redundancy
Data Backups
Data Redundancy
High Availability
M14 Practice Quiz
Powering Data Centers
Redundant Site Considerations
Resilience and Recovery Testing
M15 - Security Architecture
Centralized vs Decentralized Architectures
Cloud Security
Embedded Systems
ICS and SCADA
Infrastructure as Code (IaC)
Internet of Things (IoT)
M15 Practice Quiz
Microservices
Network Infrastructure
On-premise versus the Cloud
Security Architecture (OBJ 3.1 & 4.1)
Security Architecture
Serverless
Software-Defined Network (SDN)
Virtualization and Containerization
M16 - Security Infrastructure
Configuring Firewalls
Firewalls for Security
IDS and IPS
Infrastructure Considerations
M16 Practice Quiz
Network Appliances
Port Security
Ports and Protocols
SD-WAN and SASE
Securing Network Communications
Security Infrastructure (OBJ 3.2 & 4.5)
Security Infrastructure
Selecting Infrastructure Controls
M17 - Identity and Access Management (IAM) Solutions
Access Control Models
Assigning Permissions
Federation
Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)
Identity and Access Management (IAM) Solutions
Identity and Access Management (IAM)
M17 Practice Quiz
Multifactor Authentication (MFA)
Password Attacks
Password Security
Privileged Access Management (PAM)
Single Sign-On (SSO)
M18 - Vulnerabilities and Attacks
Bluetooth Vulnerabilities and Attacks
Buffer Overflow
Hardware Vulnerabilities
M18 Practice Quiz
Mobile Vulnerabilities and Attacks
Operating System Vulnerabilities
Race Conditions
SQL and XML Injections
Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)
Vulnerabilities and Attacks
XSS and XSRF
Zero-day Vulnerabilities
M19 - Malicious Activity
Directory Traversal Attack
Distributed Denial of Service
Domain Name System (DNS) Attacks
Execution and Escalation Attack
Indicators of Compromise (IoC)
Injection Attacks
M19 Practice Quiz
Malicious Activity (OBJ 2.4)
Malicious Activity
On-path Attacks
Replay Attacks
Session Hijacking
M2 - Fundamentals of Security
Accounting
Authentication
Authorization
Availability
Confidentiality
Fundamentals of Security (OBJ 1.1 and 1.2)
Fundamentals of Security
Gap Analysis
Integrity
M2 Practice Quiz
Non-repudiation
Security Control Categories
Security Control Types
Threats and Vulnerabilities
Zero Trust
M20 - Hardening
Changing Default Configurations
Data Encryption Levels
Group Policies
Hardening (OBJ .)
Hardening
M20 Practice Quiz
Patch Management
Restricting Applications
Secure Baselines
SELinux
Trusted Operating Systems
Updates and Patches
M21 - Security Techniques
Application Security
Email Security
Endpoint Detection and Response
M21 Practice Quiz
Network Access Control (NAC)
Security Techniques (OBJ. )
Security Techniques
Selecting Secure Protocols
User Behavior Analytics
Web and DNS Filtering
Wireless Infrastructure Security
Wireless Security Settings
M22 - Vulnerability Management
Identifying Vulnerabilities
M22 Practice Quiz
Responsible Disclosure Programs
Threat Intelligence Feeds
Validating Vulnerability Remediation
Vulnerability Management (OBJ .)
Vulnerability Management
Vulnerability Reporting
Vulnerability Response and Remediations
M23 - Alerting and Monitoring
Alerting and Monitoring (OBJ .)
Alerting and Monitoring Activities
Alerting and Monitoring
Data from Security Tools
M23 Practice Quiz
Monitoring Resources
Network and Flow Analysis
Security Content Automation and Protocol (SCAP)
Security Information and Event Management (SIEM)
Simple Network Management Protocol (SNMP)
Single Pane of Glass
M24 - Incident Response
Data Collection Procedures
Digital Forensic Procedures
Disk Imaging and Analysis
Incident Response (OBJ 4.8)
Incident Response Process
Incident Response Training and Testing
Incident Response
M24 Practice Quiz
Root Cause Analysis
Threat Hunting
M25 - Investigating an Incident
Application Logs
Automated Reports
Endpoint Logs
Firewall Logs
Investigating an Incident (OBJ 4.9)
Investigating an Incident
Investigative Data
IPS-IDS Logs
M25 Practice Quiz
Metadata
Network Logs
OS-specific Security Logs
Packet Captures
Security Dashboards
Vulnerability Scans
M26 - Automation and Orchestration
Automating Application Development
Automating Onboarding
Automating Security
Automation and Orchestration (OBJ 4.7)
Automation and Orchestration
Automation Support Tickets
Benefits of Automation and Orchestration
Integrations and APIs
M26 Practice Quiz
When to Automate and Orchestrate
M27 - Security Awareness
Avoiding Social Engineering
Creating a Culture of Security
M27 Practice Quiz
Password Managers
Policy and Handbooks
Recognizing Insider Threats
Remote and Hybrid Work Environments
Security Awareness (OBJ 5.6)
Security Awareness
M3 - Threat Actors
Hacktivists
Insider Threats
M3 Practice Quiz
Nation-state Actor
Organized Crime
Outsmarting Threat Actors
Shadow IT
Threat Actor Attributes
Threat Actor Motivations
Threat Actors (OBJ 1.2, 2.1, 2.2)
Threat Actors
Threat Vectors and Attack Surfaces
Unskilled Attackers
M4 - Physical Security
Access Badge Cloning
Access Control Vestibules
Attacking with Brute Force
Bypassing Surveillance Systems
Door Locks
Fencing and Bollards
M4 Practice Quiz
Physical Security (OBJ 1.2 and 2.4)
Physical Security
Surveillance Systems
M5 - Social Engineering
Frauds and Scams
Impersonation
Influence Campaigns
M5 Practice Quiz
Motivational Triggers
Other Social Engineering Attacks
Phishing Attacks
Pretexting
Preventing Phishing Attacks
Social Engineering (OBJ 2.2 and 5.6)
Social Engineering
M6 - Malware
Backdoors and Logic Bombs
Indications of Malware Attacks
Keylogger
M6 Practice Quiz
Malware (OBJ 2.4)
Malware Attack Techniques
Malware
Ransomware
Rootkits
Spyware and Bloatware
Trojans
Viruses
Worms
Zombies and Botnets
M7 - Data Protection
Data Classification
Data Loss Prevention (DLP)
Data Ownership
Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)
Data Protection
Data Sovereignty
Data States
Data Types
M7 Practice Quiz
Securing Data
M8 - Cryptographic Solutions
Asymmetric Algorithms
Blockchain
Cryptographic Attacks
Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)
Cryptographic Solutions
Digital Certificates
Encryption Tools
Hashing (OBJ 1.4)
Increasing Hash Security
M8 Practice Quiz
Obfuscation
Public Key Infrastructure (PKI)
Symmetric Algorithms
Symmetric vs Asymmetric
M9 - Risk Management
M9 Practice Quiz
Qualitative Risk Analysis
Quantitative Risk Analysis
Risk Assessment Frequency
Risk Identification
Risk Management (OBJ 5.2)
Risk Management Strategies
Risk Management
Risk Monitoring and Reporting
Risk Register
Security+ Practice Tests
Sec+ Practice Test 1
Sec+ Practice Test 2
Sec+ Practice Test 3
Sec+ Practice Test 4
Sec+ Practice Test 5
Sec+ Practice Test 6
Security+
02 - Areas
CraftLab
CraftLab Management
CraftLab
HomeLab Physical Setup
Initializing Kubernetes Cluster
Set Up Kubernetes Cluster
Set Up Minecraft Server
Setting up Raspberry Pi's
Setting up worker nodes
Hackathon
Fall CTF 2025
FallCTF 25 (solved)
FallCTF 25
HowdyHack 2025
PaperDuel
InnovaLab 2025
InnovaLab 2025 - ML Hackathon - Lakitus
Hackathon History
HackTheBox
HTB Academy
Bug Bounty Hunter
1. Web Requests
CRUD API
GET
HTTP Headers
HTTP Methods and Codes
HTTP Requests and Responses
POST
Web Requests
2. Introduction to Web Applications
Back End Servers
Cascading Style Sheets (CSS)
Common Web Vulnerabilities
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Databases
Development Frameworks & APIs
Front End vs. Back End
HTML Injection
HTML
Introduction to Web Applications
JavaScript
Public Vulnerabilities
Sensitive Data Exposure
Some Web Application Attacks
Web Application Layout
Web Servers
3. Using Web Proxies
Automatic Modification
Burp Intruder
Burp Scanner
Encoding and Decoding
Extensions
Intercepting Responses
Intercepting Web Requests
Intro to Web Proxies
Proxy Setup
Proxying Tools
Repeating Requests
Skills Assessment - Using Web Proxies
Using Web Proxies
ZAP Fuzzer
ZAP Scanner
4. Information Gathering - Web Edition
Automating Recon
Certificate Transparency (CT) Logs
Crawling
Creepy Crawlies
Digging DNS
DNS in Web Recon
DNS Zone Transfers
Fingerprinting
Information Gathering - Web Edition
robots.txt
Search Engine Discovery
Skills Assessment - Information Gathering - Web Edition
Subdomain Bruteforcing
Subdomains
Utilizing WHOIS
Virtual Hosts
Web Archives
Web Reconnaissance
Well-Known URIs
WHOIS
5. Web Fuzzing
API Fuzzing
Directory and File Fuzzing
Filtering Fuzzing Output
Fuzzing tools (tooling)
Indentifying Endpoints
Intro to Fuzzing
Parameter and Value Fuzzing
Recursive Fuzzing
Skills Assessment - Web Fuzzing
Validating Findings
Virtual Host and Subdomain Fuzzing
Web APIs
Web Fuzzing
6. JavaScript Deobfuscation
Basic & Advanced Obfuscation
Code Analysis
Code Obfuscation
Decoding
Deobfuscation
JavaScript Deobfuscation
Skills Assessment - JavaScript Deobfuscation
Source Code (web)
7. Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Defacing
DOM XSS
Intro to XSS
Phishing (XSS)
Reflected XSS
Session Hijacking (XSS)
Stored XSS
XSS Discovery
Bug Bounty Hunter
HTB Labs
Starting Point
Tier 0
Dancing
Fawn
Meow
Redeemer
Tier 1
Appointment
Crocodile
Responder
Sequel
HackTheBox Directory
03 - MaccGenics
Interface
Areas
MaccGenics Notes Home
TAMU Brain
Fundamentals of Security
#Cybersecurity
Module 2 Index:
Fundamentals of Security (OBJ 1.1 and 1.2)
Threats and Vulnerabilities
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Authorization
Accounting
Security Control Categories
Security Control Types
Gap Analysis
Zero Trust
M2 Practice Quiz