Cyber Capstone 8/18/2024 videos Code High School you are completing.
Try these video links if you links above do not work.
1.2 Encryption Algorithms
https://youtu.be/p9iFBa_QQsU
1.2.8 Encryption Standards
https://youtu.be/HCBwbh0EHqQ?si=-v70MA3iEZqfuYdY
1.3 Advanced Cryptography
https://youtu.be/oJsTNq9miig?si=6F5ZnV6v2_duIpRi
1.4 Hash Functions
https://youtu.be/fgAtR7T6wsw?si=GucEO_qPhruE0RFB
1.5 Hash Function Development
https://youtu.be/qGTAIpK5aEE?si=y1lUmo8O1RfGV1rq
1.6 Asymmetric Encryption
https://youtu.be/8zPdGSF120g?si=Hw1JOro9TiLaqPYv
1.7 Digital Certificates
https://youtu.be/n0Vu9PFzBCk?si=DR2sglrKH5zoNAhv
Due Date: August 23, 2024
2.4.14 - Password Attacks - Teacher Notes - Read this.
2.8.2 - Elliptic Curves and Perfect Forward Secrecy - Read this.
Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "2.8.1Lastname-EllipticCurves_GuidedNotes"
Title: "Elliptic Curves Signatures".
Modify the Standard heading with your information.
Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals
2_8_2_EllipticCurves/2.8.2 - Elliptic Curves and Perfect Forward Secrecy - Guided Notes Answer this.
Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "2.8.1Lastname-quiz-EllipticCurves"
Title: "Quiz Elliptic Curves".
Modify the Standard heading with your information.
Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals
Course Outline for Cyber Capstone
Unit 1 - Actors/Motivations, CIA & Authentication
Unit 1 Lesson Plan
2.1.1 - Threat Actors Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Stuxnet Quiz : Key
1.2.1 - CIA Triad and AAA Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
4.6.2 - Multifactor Authentication (MFA) Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Biometrics Quiz : Key
2.4.14 - Password Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Passwords
Lab - Rainbow Table
Lab - Brute Force Offline
Lab - Brute Force Online Quiz : Key
4.6.3 - Passwords Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Dictionary Quiz : Key
Unit 2 - Social Engineering & Access Control
Unit 2 Lesson Plan
2.2.2 - Principles of Social Engineering Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Influence Campaigns Quiz : Key
2.2.3 - Phishing and Spam Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Credential Harvesting
Case Study - Salesforce Phishing Quiz : Key
5.6.1 - Phishing Awareness Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Phishing Quiz : Key
2.2.4 - Misinformation and Impersonation Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Hoaxes Quiz : Key
2.2.5 - Watering Hole Attacks and Typosquatting Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Typosquatting
Case Study - Watering Hole Quiz : Key
5.6.2 - Security Awareness Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Insider Threat Quiz : Key
Unit 3 - Threats &s; Attack Surfaces
Unit 3 Lesson Plan
2.4.1 - Malware Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Malware Quiz : Key
2.4.2 - Ransomware Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Ransomware
Case Study - FBI Response to REvil Ransomware Quiz : Key
2.4.3 - Trojans, Backdoors, and RATs Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Trojan
Lab - Backdoor
Lab - RAT/Bot
Case Study - The TeaBot Malware Goes Global Quiz : Key
2.4.4 - Viruses, Worms, Spyware &s; Adware Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.4.5 - Keyloggers Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Intro to Keyloggers
Lab - Keylogger Application Quiz : Key
2.4.6 - Logic Bombs &s; Rootkits Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Logic Bomb Quiz : Key
2.2.1 - Common Attack Surfaces Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Wireless Security Quiz : Key
2.4.8 - DoS and DDoS Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Denial of Service
Case Study - Botnet Quiz : Key
2.4.9 - DNS Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.4.10 - Wireless, On-Path, and Replay Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Session Replay
Case Study - Wireless Disassociation Quiz : Key
4.5.1 - Endpoint - Protocol &s; Email Security Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Heartbleed Quiz : Key
4.1.2 - Wireless Devices Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Wireless Jamming Quiz : Key
2.3.1 - Application Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Race Conditions
Case Study - iPhone Integer Overflow Quiz : Key
2.4.11 - Application Attacks Part 1 Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Directory Traversal
Lab - Privilege Escalation
Lab - Pass the Hash Quiz : Key
2.4.12 - Application Attacks Part 2 Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Buffer Overflow
Lab - Command Injection
Lab - Intro CSRF
Lab - CSRF Application
Case Study - Chrome Crash Catastrophe Quiz : Key
4.1.4 - Application Security Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.3.2 - OS and Web-based Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - SQL Injection DVWA
Lab - SQL Injection Juice Shop
Lab - XSS DVWA
Lab - XSS Juice Shop Quiz : Key
4.5.2 - Endpoint - OS &s; Monitoring Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.3.3 - Hardware and Virtualization Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - VENOM Vulnerability Quiz : Key
2.3.4 - Supply Chain, Zero-day, and Cryptographic Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Zero Day Attack Quiz : Key
4.1.3 - Mobile Solutions Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Geolocation Quiz : Key
2.4.7 - Physical Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.2.3 - Physical Security Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 4 - Cryptographic Solutions
Unit 4 Lesson Plan
1.4.2 - Encryption Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Linux Personal File Encryption
Lab - Windows 7 Personal File Encryption Quiz : Key
1.4.4 - Obfuscation and Steganography Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Obfuscation
Lab - Steganography
Case Study - Steganography Quiz : Key
1.4.5 - Hashing, Digital Signatures, and Blockchain Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.4.1 - Public Key Infrastructure Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.4.6 - Certificates Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Certificates Quiz : Key
1.4.3 - Cryptographic Tools Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.4.13 - Cryptographic Attack Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Collision Quiz : Key
Unit 5 - Vulnerability Analysis &s; Remediation
Unit 5 Lesson Plan
4.3.1 - Identifying Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - ip-ifconfig
Case Study - Pen Testing Quiz : Key
5.5.2 - Pentesting Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Bug Bounty Quiz : Key
4.4.1 - Monitoring Resources Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
4.4.2 - Monitoring Tools Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Wireshark
Lab - tcpdump Quiz : Key
1.2.4 - Deception and Disruption Technology Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Honeypot Quiz : Key
4.3.2 - Vulnerability Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 6 - Security Controls
Unit 6 Lesson Plan
1.1.1 - Security Controls Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.1.2 - Architecture Considerations Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.1 - Infrastructure Considerations Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.5.2 - Hardening Techniques Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Backdoor Removal
Lab - RAT Removal
Lab - Backdoor Shortcut Quiz : Key
4.5.3 - Endpoint - Firewall, IDS/IPS &s; Web Filter Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.2 - Network Appliances Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.5.1 - Mitigation Techniques Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.3 - Secure Communication/Access and Effective Controls Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - NordVPN Hack Quiz : Key
Unit 7 - Data Management
Unit 7 Lesson Plan
3.3.1 - Data Classification and Types Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Handling Sensitive Data Quiz : Key
3.3.2 - Data Sovereignty and Protection Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - File Hashing Quiz : Key
3.4.1 - Resilience and Recovery I Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.4.2 - Resilience and Recovery II Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 8 - Infrastructure &s; SecOps
Unit 8 Lesson Plan
3.1.1 - Architecture and Infrastructure Concepts Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Specialized Systems Vulnerabilities Quiz : Key
4.1.1 - Hardening Targets and Secure Baselines Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Exposure Through Cloud Misconfiguration Quiz : Key
4.6.1 - Access Management Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Quantum Cryptography Quiz : Key
4.7.1 - Scripting and Automation Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 9 - Incident Response
Unit 9 Lesson Plan
2.4.15 - Indicators of Malicious Activity Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Equifax Quiz : Key
4.8.1 - Incident Response Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Cuckoo
Case Study - Incident Response Quiz : Key
4.9.1 - Logs Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Metadata Quiz : Key
Unit 10 - Processes &s; Governance
Unit 10 Lesson Plan
1.2.2 - Gap Analysis and Zero Trust Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.1 - Business Processes Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.2 - Technical Implications of Change Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.3 - Documentation and Version Control of Change Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
4.2.1 - Data Asset Management Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Data Sanitization
Case Study - Data Destruction Quiz : Key
5.1.1 - Security Governance Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - The GDPR Quiz : Key
Unit 11 - Risk, Audits &s; Compliance
Unit 11 Lesson Plan
5.2.1 - Risk Management Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Failure to Disclose Quiz : Key
5.3.1 - Third-Party Vendors Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
5.4.1 - Security Compliance Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
5.5.1 - Audits and Attestation Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key