Foundation of Cybersecurity
*********
*********
Due Date: May 8, 2024
Hardening your system Part 1
You need to practice this even if I am NOT present.
(I have told the substitue that you need to work on this first.)
Once you mastered this. Work on any remaining assignments.
WHEN I COME BACK WE WILL HAVE THE TEST.
Assignment (Network Copper Cables Quizizz)
-Exam when I see you next.
-Click on this to access your quizizz.
https://quizizz.com/join?gc=83666287
 

*********
*********
Due Date: May 7, 2024
Unit 3 - Data Safety and Best Practices

3.1.2 - System Hardening Part 1

System Hardening

is the process of securing a system by
reducing its surface of vulnerability.
This involves configuring the system to
eliminate as many security risks as
possible by removing nonessential software,
unnecessary usernames or logins, and
disabling unused services.
Here are the key components and strategies
involved in system hardening:
Operating System Updates Application Updates Minimize Installed Software User Account Management Disable Unused Services Firewall Configuration Anti-Malware Tools Encryption Audit and Monitoring Security Policies and Training

Lesson Guide PowerPoint Lab - MBSA Vulnerability Scan Lab - MBSA Vulnerability Scan Answer Key Lab - MBSA Vulnerability Scan PPT Activity - Extension - Benchmark Selections Project Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference Click here and Read System Hardening Lesson. Click here and read the lesson Guide. Copy the document found below into a google document. Answer the questions in your google document. Highlight the answer in yellow. Name the the google document "Lastname - 3.1.2 - System Hardening Part 1" Update Lastname to your last name. Title: "3.1.2 - System Hardening Part 1". Modify the Standard heading with your information. Amanda Success (Period 9) Monday December 25, 2023 Seat 99 (Grade level 13) Cyber Fundamentals Lab - MBSA Vulnerability Scan.

*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

*********
*********

-Using Linux and the python interpreter

If you have forgotten how to boot up your Kali Linux machine and run python.
Click here for full instructions.


Estimated Hours of all areas

1. Linux Basics (20 hours)
2. Security Basics (35 hours)
3. Actors and Vulnerabilities (30 hours)
4. Malware and Attacks (60 hours)
5. Organizational Security (35 hours)
https://cyber.instructure.com/courses/243 Instructional Units

Sequence 1 Cyber course Cyber Fundamentals
Unit 1 - Foundations & Threats
• 1.0 - Cybersecurity Careers, course objectives and Ethics Agreement
• 1.1 - The CIA Triad and Authentication
• 1.2 - Identifying Security Threats
• 1.3 - Introduction to CLI (Command Line Interface)
Unit 2 - The Human Factor
• 2.1 - Social Engineering
• 2.2 - OSINT & Phishing
Unit 3 - Data Safety and Best Practices
• 3.1.1 - System Vulnerabilities
April 29, 2024 • 3.1.2 - System Harding Part 1
• 3.1.3 - System Harding Part 2
Unit 4 - Cryptography and Linux
• 4.1 - Bits, Binary and Encoding
• 4.2 - Basic Concepts of Cryptography
• 4.3 - Advanced Linux Command Line Interface
• 4.4 - Crypto Issues of Privacy vs Security
Unit 7 - Reconnaissance
• 7.1 Recon Introduction and Google Dorking
• 7.2 WHOIS and Nslookup
• 7.3 Network Scanning
Unit 8 - Network & System Threats
• 8.1 Net Attacks - Denial of Service (DoS)
• 8.2 Spoofing & Sniffing
• 8.3 Wireless, Mobile & VPNs
• 8.4 Pentesting & Exploits
• 8.5 Cyber War
Unit 9 - Online Threats
• 9.1 Basic Web Concepts
• 9.2 Web Vulnerabilities
• 9.3 SQL Database Attacks
Unit 10 - Encryption Security Tools
• 10.1 Symmetric & Asymmetric Encryption
• 10.2 SSL for Online Security
Instructional Units
Digitial Forensics


Sequence 2 Cyber course https://cyber.instructure.com/courses/243
Unit 5 - Devices and Networking
• 5.1 - Computing Devices
• 5.2 - Networking Fundamentals
• 5.3 - Protocols and Packets
Unit 6 - Law & Ethics
• 6.1 Impact of Law and Ethics on Cybercrime
https://cyber.instructure.com/courses/100 Unit 2 - Forensics (Digital Forensics)
- Extensive Linux Sessions
- https://www.cusack2.com/KCHS23_24/202404Apr/W01/03_Cyber/Cyber.html
Unit 13 - Network Security (Digital Forensics)
Unit 15 - Governance, Risk, and Compliance (Digital Forensics)
General outline of High Level
Cyber Capstone

Sequence 1 Cyber course Unit 0 - Teacher Resources.
Unit 1 - Intro to Linux
Unit 3 - Unit 3 - Password
Unit 4 - Encryption and Cryptopgraphy
Unit 5 - Authentication and Security Protocols
Unit 6 - social Engineering
Unit 7 - Threat Vector
Unit 8 - malware and Attacks Part 1
Unit 9 - Malware and Attachks Part 2
Unit 10 - Malware and Attacks part 3
Unit 11 - Malware and Attacks part 4
Unit 12 - Architecture and Design
Unit 14 - Mobile Devices and PKI