Lab 9 due. Capstone report submitted. Course close. Forward pointers to PEN-101, RE-011, RE-101, ADV-101, ADV-102, WIR-101.
Reading
No new reading this week. Any remaining reading is for capstone research and revision.
Lecture outline (~30 min)
Course close: from security-aware programmer to practitioner-with-vocabulary (30 min)
SEC-101's closing message, delivered in lecture and built into the capstone deliverable, is the transition it marks.
What you had when you arrived: You could read a packet capture, write a Python script, and work at a bash shell. You were a programmer-with-some-security-awareness. Security was something that happened to systems you built; the adversarial framing was background texture.
What you have now:
-
A vocabulary: CIA triad, STRIDE, OWASP Top 10, MITRE ATT&CK, CVSS, CWE, CVE, CNA, CVD, TLS, JNDI, IDOR, XSS, XXE, SQLi, SSTI, bcrypt, argon2, WebAuthn, TOTP, SIEM, CFAA, NIS2. These are the terms every downstream Virtus course assumes you know. You can read a threat-intelligence report, a vendor advisory, a CVE record, and a bug-bounty scope statement without a glossary.
-
A mental model: you know to ask "what could go wrong for whom under what assumptions?" before asking "what tool do I run?" Threat modeling is how you approach unfamiliar systems; STRIDE is the checklist that keeps you from missing categories.
-
A disciplinary grounding: you know the legal line (CFAA, authorization), the professional line (CVD, codes of conduct), and the ethical line (Canon 1: society's welfare first). Every offensive course downstream operates within these constraints. Students who skip this framing arrive at PEN-101 unprepared.
The transition: You stop being a programmer-with-some-security-awareness and start being a practitioner-with-formal-vocabulary. The vocabulary is the entry ticket to the rest of the field.
Lab: Capstone delivery (graded)
Lab 9: Historical-CVE explainer report
See labs/lab-9-capstone.md and CAPSTONE.md for the full specification.
Submission:
Push your capstone repository to GitHub or GitLab. The repository contains:
report.md: the 5-8 page report.timeline-diagram.pngortimeline-diagram.svg: the disclosure timeline diagram.- At least 3 commits in the git history.
Email the repository URL to interested@virtuscyberacademy.org with subject SEC-101 capstone, [your name]. The course team replies within 7 days with the grade and brief feedback.
Forward pointers
After SEC-101, the pipeline's offensive and RE tracks open up. Each requires SEC-101 as a prerequisite; each extends a specific part of what SEC-101 introduced.
VCA-PEN-101: Intro to Penetration Testing
PEN-101 is where the threat model becomes the engagement scope. The OWASP Top 10 fluency you built in Weeks 7-9 becomes the web-app pentest playbook. The CVD discipline from Weeks 11-12 becomes the engagement reporting standard. PEN-101 introduces nmap, Metasploit, Burp Suite Pro, and the full penetration-testing methodology. The ethical foundation from SEC-101 is assumed; PEN-101 does not re-teach it.
Skill transfer: OWASP Top 10 -> web-app pentest playbook; STRIDE -> engagement scope; CVD -> engagement report.
VCA-RE-011: Intro to Reverse Engineering
RE-011 takes the vulnerability-class vocabulary SEC-101 introduced (buffer overflow, format string, use-after-free) and traces it through assembly code. Erickson's Hacking: The Art of Exploitation is the bridge reading between SEC-101 and RE-011. Students who read it between the two courses arrive prepared.
Skill transfer: vulnerability-class vocabulary -> assembly-level analysis; CVE record reading -> identifying the vulnerable code.
VCA-RE-101: Reverse Engineering of Embedded Systems
RE-101 applies CVE-reading discipline to embedded firmware. The SB6141 cable modem is the lab target. The CVE-record-walk skill from Lab 8 is the research workflow RE-101 uses to select vulnerability candidates for firmware analysis.
Skill transfer: Lab 8 CVE-walk discipline -> SB6141 firmware vulnerability selection.
VCA-ADV-101: Adversarial Techniques
ADV-101 is CVE-reproduction work: given a published vulnerability, reproduce the exploit in a controlled environment and build a detection. SEC-101's CVE-walk literacy is the table-stakes entry skill. The Log4Shell case study from Week 9 is the structural pattern ADV-101 applies at greater depth.
Skill transfer: CVSS v3.1 scoring -> severity triage; CVE reading -> reproduction target selection.
VCA-ADV-102: LLM-CVE Variant
ADV-102 applies the CVE-reproduction methodology to LLM and agentic security vulnerabilities. The OWASP LLM Top 10 and OWASP ASI Top 10 forward pointers from SEC-101's Week 1 readings become the working analytical vocabulary. CVE-2025-65106 (LangChain Jinja2 template injection) and CVE-2026-34971 (agentic sandbox escape) are the first-semester lab targets.
Skill transfer: OWASP Top 10 framing -> OWASP LLM Top 10 + ASI Top 10 analysis; SEC-101 injection vocabulary -> prompt injection attack class.
VCA-WIR-101: Wireless Penetration Testing
WIR-101 applies STRIDE threat modeling and CVE-record reading to 802.11 wireless networks. KRACK, Dragonblood, and FragAttacks are read as CVE records first; the SEC-101 CVE-walk skill applies directly. The optional advanced-extension 5G-AKA lab from the SEC-101 Lab Manifest (not part of the required course) is the entry point for the cellular security track.
Skill transfer: STRIDE categories -> 802.11 threat model; CVE-walk skill -> wireless CVE research.
Reflection prompts (final, not submitted)
-
Look back at Lab 1, the CIA-triad worksheet on the system you chose in Week 1. With fourteen weeks of additional vocabulary, what threats did you identify in Lab 1 that you would now describe more precisely? What threats did you miss entirely that you can now name?
-
The course's closing message says you are now a "practitioner-with-formal-vocabulary." What does the vocabulary give you that intuition alone does not? Describe one conversation you could now have with a security professional that you could not have had at the start of Week 1.
-
Which downstream course interests you most, and why? What specific skill from SEC-101 do you think you'll rely on most in that course?
Week 14 of 14. SEC-101 complete. Next steps: VCA-PEN-101, VCA-RE-011, VCA-RE-101, VCA-ADV-101, VCA-ADV-102, or VCA-WIR-101.