Foundation of Cybersecurity
*********
*********
Due Date: September 6, 2024
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 






*********
*********
Due Date: September 11, 2024
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 







*********
*********
Due Date: August 23, 2024
Video associated with Code High School above. Watch them below for review.

Cyber Fundamentals 8/8/2024 Code high school

Video 1.1.5 Cyberbullying Notebook
https://youtu.be/vtfMzmkYp9E?si=CXVkwWpVm2fcFsk_
 
Video 1.2.2 What Google Does with Your Data
https://youtu.be/nRJGRbi2g3c?si=GmUz4ueHtJ9XLxip
 
Video 1.2.5 Privacy and the Law
https://youtu.be/j6wwBqfSk-o?si=8jUcrgAwredhx2j8
 
Video 1.3.6 Search Challenge
-Search engine basics
 https://youtu.be/Y2J7sVpmeq8?si=_sYAnO8pcfySv5XT

-10 Google Search Tricks You Should Be Using! (2024)
 https://youtu.be/NYz7m88stJA?si=QhGkMzeTK5TfPTcT

  
Video 1.4.5 Getting Permission
https://youtu.be/3aj-wDy4THo?si=kNci2RTBgMfQkKrL
   
Video 1.5.4 Browser Security Settings Exploration
Browser Security - CompTIA A+ 220-1102 - 2.10
https://youtu.be/pbEAxGjIIuw?si=Vr7LBJJsNn05c7Fy
	
Video 1.7.1 Protecting Your Computer
How To Protect Your Computer From Getting Hacked
https://youtu.be/-EQAGflWco8?si=U6YOlwAW9kNGdQOl
 
Firewalls - SY0-601 CompTIA Security+ : 3.3
https://youtu.be/qLb2ioDBofg?si=qITz9KQvObyJWS-m
	 
Preventing Attacks.
8 Basic Cyber Attacks … and How to Avoid Them
https://youtu.be/Ym00-RJnFsk?si=aA3JhZME3TrytONn
	  
Sydney couple duped $100K in sophisticated phishing scam | 9 News Australia
https://youtu.be/EAOnh9VMqd8?si=f7jS6FPSqEMqLwl9

*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

*********
*********

curriculum outline below: https://cyber.instructure.com/courses/243

	
Course Content
Unit 1 - Foundations and Threats
Unit 1 Assessment

Section 0.1 - First Day Info &s; Ethics Agreement
Lesson Plan
0.1.1 - First Day Info &s; Ethics Agreement	Lesson Guide
PowerPoint	Activity - Course Interest Survey
Ethics Agreement
Section 1.1 - CIA Triad and Authentication
Lesson Plan
A1.1.1 - Intro to Security Concepts	Lesson Guide
PowerPoint	Activity - Understanding the CIA Triad
Activity - Understanding the CIA Triad Answers
Activity - CIA Triad Card Game
Activity - CIA Triad Card Game Answers
B1.1.2 - Authentication	Lesson Guide
PowerPoint	Activity - Testing Password Strength
Activity - Safe Password Poster Instructions
Activity - Creating a Safe Password
1.1.3 - Authentication and Password Attacks	Lesson Guide
PowerPoint	Activity - Have you been Pwned?
C1.1.4 - Password Hashing	Lesson Guide
PowerPoint	Activity - Hashing &s; Salts with Cyber Chef
Activity - Our Rainbow Table spreadsheet
Activity - NIST Password Guidelines Worksheet
Activity - NIST Guidelines Article 1
Activity - NIST Guidelines Article 2
D1.1.5 - Methods of Authentication	Lesson Guide
PowerPoint	Activity - Which Authentication
Activity - Which Authentication Samples Answers
Activity - Extension - Biometric Authentication Product Pitch
Section 1.2 - Identifying Security Threats
Lesson Plan
E1.2.1 - Malicious Code - Part 1	Lesson Guide
PowerPoint	Activity - Historic Malware - Teacher
Activity - Historic Malware - Student
Activity - Historic Malware - Reference Articles
Activity - Historic Malware Template
Activity - Malware Notes Sheet
F1.2.2 - Malicious Code - Part 2	Lesson Guide
PowerPoint	
FSection 1.3 - Intro to CLI (Command Line Interface)
Lesson Plan
G1.3.1 - Virtualization	Lesson Guide
PowerPoint	
HH.Lab - Online Virtual Machine Access
II.Lab - Online Virtual Machine Access PPT
J1.3.2 - Command Line Interface - Linux	Lesson Guide
PowerPoint	Lab - Terminus Part 1
KK.Lab - Terminus Part 1 Answers
LL.Lab - Terminus Part 1 Map
MM.Lab - Terminus Part 1 PPT
NN.Lab - Password Cracking with John the Ripper
PP.Lab - Password Cracking with John the Ripper Answers
QQ.Lab - Password Cracking with John the Ripper PPT
Linux Commands Reference Sheet
RR.Lab - Extension - Windows CLI
SS.Lab - Extension - Windows CLI PPT
 	 	 
Unit 2 - Human Factor
Unit 2 - Assessment

Section 2.1 - Social Engineering
Lesson Plan
2.1.1 - Social Engineering	Lesson Guide
PowerPoint	Activity - 7 Steps of Hacking
Activity - 7 Steps of Hacking Answers
Activity - Extension - Social Engineering PSA Video Project
Activity - Extension - Social Engineering PSA Video Project Rubric
Lab - Social Engineering Toolkit
Lab - Social Engineering Toolkit PPT
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing	Lesson Guide
PowerPoint	
2.2.2 - OSINT	Lesson Guide
PowerPoint	Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project		Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk	Lesson Guide
PowerPoint	Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
 	 	 
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment

Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities	Lesson Guide
PowerPoint	Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1	Lesson Guide
PowerPoint	Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2	Lesson Guide
PowerPoint	Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT	Lesson Guide
PowerPoint	Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
 	 	 
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment

Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary	Lesson Guide
PowerPoint	Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers	Lesson Guide
PowerPoint	ASCII Chart Handout
4.1.3 - Encoding	Lesson Guide
PowerPoint	Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts	Lesson Guide
PowerPoint	Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography	Lesson Guide
PowerPoint	Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI	Lesson Guide
PowerPoint	Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting	Lesson Guide
PowerPoint	Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate		Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
 	 	 
Unit 5 - Devices &s; Networks
Unit 5 - Assessment

Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components	Lesson Guide
PowerPoint	Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections	Lesson Guide
PowerPoint	Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming	Lesson Guide
PowerPoint	Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network	Lesson Guide
PowerPoint	Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols	Lesson Guide
PowerPoint	Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
 	 	 
Unit 6 - Law &s; Ethics
Unit 6 - Assessment

Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics	Lesson Guide
PowerPoint	Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
 	 	 
Unit 7 - Reconnaissance
Unit 7 - Assessment

Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking	Lesson Guide
PowerPoint	Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS	Lesson Guide
PowerPoint	Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup	Lesson Guide
PowerPoint	Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks	Lesson Guide
PowerPoint	Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning	Lesson Guide
PowerPoint	Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
 	 	 
Unit 8 - Network &s; System Threats
Unit 8 - Assessment

Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking	Lesson Guide
PowerPoint	Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks	Lesson Guide
PowerPoint	Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing	Lesson Guide
PowerPoint	Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs	Lesson Guide
PowerPoint	Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits	Lesson Guide
PowerPoint	Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario	Lesson Guide
PowerPoint	Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools	Lesson Guide
PowerPoint	Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons	Lesson Guide
PowerPoint	Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
 	 	 
Unit 9 - Securing Online Components
Unit 9 - Assessment

Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics	Lesson Guide
PowerPoint	Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities	Lesson Guide
PowerPoint	Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats	Lesson Guide
PowerPoint	Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection	Lesson Guide
PowerPoint	Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
 	 	 
Unit 10 - Encryption Security Tools
Unit 10 - Assessment

Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption	Lesson Guide
PowerPoint	Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption	Lesson Guide
PowerPoint	Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security	Lesson Guide
PowerPoint	Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT	















*********
*********