Cyber Capstone
*********
*********
Due Date: August 23, 2024

Click here to gain access. https://codehs.com/go/F759E
or
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 









*********
*********

Cyber Capstone 8/18/2024 videos Code High School you are completing.
Try these video links if you links above do not work.

1.2 Encryption Algorithms
https://youtu.be/p9iFBa_QQsU

1.2.8 Encryption Standards
https://youtu.be/HCBwbh0EHqQ?si=-v70MA3iEZqfuYdY

1.3 Advanced Cryptography
https://youtu.be/oJsTNq9miig?si=6F5ZnV6v2_duIpRi

1.4 Hash Functions
https://youtu.be/fgAtR7T6wsw?si=GucEO_qPhruE0RFB

1.5 Hash Function Development
https://youtu.be/qGTAIpK5aEE?si=y1lUmo8O1RfGV1rq

1.6 Asymmetric Encryption
https://youtu.be/8zPdGSF120g?si=Hw1JOro9TiLaqPYv

1.7 Digital Certificates
https://youtu.be/n0Vu9PFzBCk?si=DR2sglrKH5zoNAhv	


*********
*********
Due Date: August 23, 2024
2.4.14 - Password Attacks - Teacher Notes - Read this.
2.8.2 - Elliptic Curves and Perfect Forward Secrecy - Read this.

Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "2.8.1Lastname-EllipticCurves_GuidedNotes"
Title: "Elliptic Curves Signatures".
Modify the Standard heading with your information.

Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals

2_8_2_EllipticCurves/2.8.2 - Elliptic Curves and Perfect Forward Secrecy - Guided Notes Answer this.

Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "2.8.1Lastname-quiz-EllipticCurves"
Title: "Quiz Elliptic Curves".
Modify the Standard heading with your information.

Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals	


*********
*********

curriculum outline below: https://cyber.instructure.com/courses/100

*********
*********

Course Outline for Cyber Capstone 	 	 	 	 

Unit 1 - Actors/Motivations, CIA & Authentication
Unit 1 Lesson Plan

2.1.1 - Threat Actors	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Stuxnet	Quiz : Key
1.2.1 - CIA Triad and AAA	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.6.2 - Multifactor Authentication (MFA)	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Biometrics	Quiz : Key
2.4.14 - Password Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Passwords
Lab - Rainbow Table
Lab - Brute Force Offline
Lab - Brute Force Online	Quiz : Key
4.6.3 - Passwords	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Dictionary	Quiz : Key
 	 	 	 	 
Unit 2 - Social Engineering & Access Control
Unit 2 Lesson Plan

2.2.2 - Principles of Social Engineering	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Influence Campaigns	Quiz : Key
2.2.3 - Phishing and Spam	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Credential Harvesting
Case Study - Salesforce Phishing	Quiz : Key
5.6.1 - Phishing Awareness	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Phishing	Quiz : Key
2.2.4 - Misinformation and Impersonation	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Hoaxes	Quiz : Key
2.2.5 - Watering Hole Attacks and Typosquatting	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Typosquatting
Case Study - Watering Hole	Quiz : Key
5.6.2 - Security Awareness	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Insider Threat	Quiz : Key
 	 	 	 	 
Unit 3 - Threats &s; Attack Surfaces
Unit 3 Lesson Plan

2.4.1 - Malware	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Malware	Quiz : Key
2.4.2 - Ransomware	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Ransomware
Case Study - FBI Response to REvil Ransomware	Quiz : Key
2.4.3 - Trojans, Backdoors, and RATs	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Trojan
Lab - Backdoor
Lab - RAT/Bot
Case Study - The TeaBot Malware Goes Global	Quiz : Key
2.4.4 - Viruses, Worms, Spyware &s; Adware	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.5 - Keyloggers	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Intro to Keyloggers
Lab - Keylogger Application	Quiz : Key
2.4.6 - Logic Bombs &s; Rootkits	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Logic Bomb	Quiz : Key
2.2.1 - Common Attack Surfaces	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Wireless Security	Quiz : Key
2.4.8 - DoS and DDoS Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Denial of Service
Case Study - Botnet	Quiz : Key
2.4.9 - DNS Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.10 - Wireless, On-Path, and Replay Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Session Replay
Case Study - Wireless Disassociation	Quiz : Key
4.5.1 - Endpoint - Protocol &s; Email Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Heartbleed	Quiz : Key
4.1.2 - Wireless Devices	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Wireless Jamming	Quiz : Key
2.3.1 - Application Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Race Conditions
Case Study - iPhone Integer Overflow	Quiz : Key
2.4.11 - Application Attacks Part 1	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Directory Traversal
Lab - Privilege Escalation
Lab - Pass the Hash	Quiz : Key
2.4.12 - Application Attacks Part 2	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Buffer Overflow
Lab - Command Injection
Lab - Intro CSRF
Lab - CSRF Application
Case Study - Chrome Crash Catastrophe	Quiz : Key
4.1.4 - Application Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.3.2 - OS and Web-based Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - SQL Injection DVWA
Lab - SQL Injection Juice Shop
Lab - XSS DVWA
Lab - XSS Juice Shop	Quiz : Key
4.5.2 - Endpoint - OS &s; Monitoring	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.3.3 - Hardware and Virtualization Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - VENOM Vulnerability	Quiz : Key
2.3.4 - Supply Chain, Zero-day, and Cryptographic Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Zero Day Attack	Quiz : Key
4.1.3 - Mobile Solutions	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Geolocation	Quiz : Key
2.4.7 - Physical Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.2.3 - Physical Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 4 - Cryptographic Solutions
Unit 4 Lesson Plan

1.4.2 - Encryption	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Linux Personal File Encryption
Lab - Windows 7 Personal File Encryption	Quiz : Key
1.4.4 - Obfuscation and Steganography	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Obfuscation
Lab - Steganography
Case Study - Steganography	Quiz : Key
1.4.5 - Hashing, Digital Signatures, and Blockchain	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.4.1 - Public Key Infrastructure	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.4.6 - Certificates	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Certificates	Quiz : Key
1.4.3 - Cryptographic Tools	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.13 - Cryptographic Attack	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Collision	Quiz : Key
 	 	 	 	 
Unit 5 - Vulnerability Analysis &s; Remediation
Unit 5 Lesson Plan

4.3.1 - Identifying Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - ip-ifconfig
Case Study - Pen Testing	Quiz : Key
5.5.2 - Pentesting	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Bug Bounty	Quiz : Key
4.4.1 - Monitoring Resources	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.4.2 - Monitoring Tools	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Wireshark
Lab - tcpdump	Quiz : Key
1.2.4 - Deception and Disruption Technology	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Honeypot	Quiz : Key
4.3.2 - Vulnerability Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 6 - Security Controls
Unit 6 Lesson Plan

1.1.1 - Security Controls	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.1.2 - Architecture Considerations	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.1 - Infrastructure Considerations	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.5.2 - Hardening Techniques	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Backdoor Removal
Lab - RAT Removal
Lab - Backdoor Shortcut	Quiz : Key
4.5.3 - Endpoint - Firewall, IDS/IPS &s; Web Filter	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.2 - Network Appliances	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.5.1 - Mitigation Techniques	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.3 - Secure Communication/Access and Effective Controls	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - NordVPN Hack	Quiz : Key
 	 	 	 	 
Unit 7 - Data Management
Unit 7 Lesson Plan

3.3.1 - Data Classification and Types	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Handling Sensitive Data	Quiz : Key
3.3.2 - Data Sovereignty and Protection	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - File Hashing	Quiz : Key
3.4.1 - Resilience and Recovery I	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.4.2 - Resilience and Recovery II	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 8 - Infrastructure &s; SecOps
Unit 8 Lesson Plan

3.1.1 - Architecture and Infrastructure Concepts	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Specialized Systems Vulnerabilities	Quiz : Key
4.1.1 - Hardening Targets and Secure Baselines	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Exposure Through Cloud Misconfiguration	Quiz : Key
4.6.1 - Access Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Quantum Cryptography	Quiz : Key
4.7.1 - Scripting and Automation	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 9 - Incident Response
Unit 9 Lesson Plan

2.4.15 - Indicators of Malicious Activity	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Equifax	Quiz : Key
4.8.1 - Incident Response	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Cuckoo
Case Study - Incident Response	Quiz : Key
4.9.1 - Logs	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Metadata	Quiz : Key
 	 	 	 	 
Unit 10 - Processes &s; Governance
Unit 10 Lesson Plan

1.2.2 - Gap Analysis and Zero Trust	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.1 - Business Processes	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.2 - Technical Implications of Change Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.3 - Documentation and Version Control of Change Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.2.1 - Data Asset Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Data Sanitization
Case Study - Data Destruction	Quiz : Key
5.1.1 - Security Governance	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - The GDPR	Quiz : Key
 	 	 	 	 
Unit 11 - Risk, Audits &s; Compliance
Unit 11 Lesson Plan

5.2.1 - Risk Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Failure to Disclose	Quiz : Key
5.3.1 - Third-Party Vendors	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
5.4.1 - Security Compliance	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
5.5.1 - Audits and Attestation	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key



*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login