Due Date: August 23, 2024
Video associated with Code High School above. Watch them below for review.
Cyber Fundamentals 8/8/2024 Code high school
Video 1.1.5 Cyberbullying Notebook
https://youtu.be/vtfMzmkYp9E?si=CXVkwWpVm2fcFsk_
Video 1.2.2 What Google Does with Your Data
https://youtu.be/nRJGRbi2g3c?si=GmUz4ueHtJ9XLxip
Video 1.2.5 Privacy and the Law
https://youtu.be/j6wwBqfSk-o?si=8jUcrgAwredhx2j8
Video 1.3.6 Search Challenge
-Search engine basics
https://youtu.be/Y2J7sVpmeq8?si=_sYAnO8pcfySv5XT
-10 Google Search Tricks You Should Be Using! (2024)
https://youtu.be/NYz7m88stJA?si=QhGkMzeTK5TfPTcT
Video 1.4.5 Getting Permission
https://youtu.be/3aj-wDy4THo?si=kNci2RTBgMfQkKrL
Video 1.5.4 Browser Security Settings Exploration
Browser Security - CompTIA A+ 220-1102 - 2.10
https://youtu.be/pbEAxGjIIuw?si=Vr7LBJJsNn05c7Fy
Video 1.7.1 Protecting Your Computer
How To Protect Your Computer From Getting Hacked
https://youtu.be/-EQAGflWco8?si=U6YOlwAW9kNGdQOl
Firewalls - SY0-601 CompTIA Security+ : 3.3
https://youtu.be/qLb2ioDBofg?si=qITz9KQvObyJWS-m
Preventing Attacks.
8 Basic Cyber Attacks … and How to Avoid Them
https://youtu.be/Ym00-RJnFsk?si=aA3JhZME3TrytONn
Sydney couple duped $100K in sophisticated phishing scam | 9 News Australia
https://youtu.be/EAOnh9VMqd8?si=f7jS6FPSqEMqLwl9
Course Content
Unit 1 - Foundations and Threats
Unit 1 Assessment
Section 0.1 - First Day Info &s; Ethics Agreement
Lesson Plan
0.1.1 - First Day Info &s; Ethics Agreement Lesson Guide
PowerPoint Activity - Course Interest Survey
Ethics Agreement
Section 1.1 - CIA Triad and Authentication
Lesson Plan
A1.1.1 - Intro to Security Concepts Lesson Guide
PowerPoint Activity - Understanding the CIA Triad
Activity - Understanding the CIA Triad Answers
Activity - CIA Triad Card Game
Activity - CIA Triad Card Game Answers
B1.1.2 - Authentication Lesson Guide
PowerPoint Activity - Testing Password Strength
Activity - Safe Password Poster Instructions
Activity - Creating a Safe Password
1.1.3 - Authentication and Password Attacks Lesson Guide
PowerPoint Activity - Have you been Pwned?
C1.1.4 - Password Hashing Lesson Guide
PowerPoint Activity - Hashing &s; Salts with Cyber Chef
Activity - Our Rainbow Table spreadsheet
Activity - NIST Password Guidelines Worksheet
Activity - NIST Guidelines Article 1
Activity - NIST Guidelines Article 2
D1.1.5 - Methods of Authentication Lesson Guide
PowerPoint Activity - Which Authentication
Activity - Which Authentication Samples Answers
Activity - Extension - Biometric Authentication Product Pitch
Section 1.2 - Identifying Security Threats
Lesson Plan
E1.2.1 - Malicious Code - Part 1 Lesson Guide
PowerPoint Activity - Historic Malware - Teacher
Activity - Historic Malware - Student
Activity - Historic Malware - Reference Articles
Activity - Historic Malware Template
Activity - Malware Notes Sheet
F1.2.2 - Malicious Code - Part 2 Lesson Guide
PowerPoint
FSection 1.3 - Intro to CLI (Command Line Interface)
Lesson Plan
G1.3.1 - Virtualization Lesson Guide
PowerPoint
HH.Lab - Online Virtual Machine Access
II.Lab - Online Virtual Machine Access PPT
J1.3.2 - Command Line Interface - Linux Lesson Guide
PowerPoint Lab - Terminus Part 1
KK.Lab - Terminus Part 1 Answers
LL.Lab - Terminus Part 1 Map
MM.Lab - Terminus Part 1 PPT
NN.Lab - Password Cracking with John the Ripper
PP.Lab - Password Cracking with John the Ripper Answers
QQ.Lab - Password Cracking with John the Ripper PPT
Linux Commands Reference Sheet
RR.Lab - Extension - Windows CLI
SS.Lab - Extension - Windows CLI PPT
Unit 2 - Human Factor
Unit 2 - Assessment
Section 2.1 - Social Engineering
Lesson Plan
2.1.1 - Social Engineering Lesson Guide
PowerPoint Activity - 7 Steps of Hacking
Activity - 7 Steps of Hacking Answers
Activity - Extension - Social Engineering PSA Video Project
Activity - Extension - Social Engineering PSA Video Project Rubric
Lab - Social Engineering Toolkit
Lab - Social Engineering Toolkit PPT
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing Lesson Guide
PowerPoint
2.2.2 - OSINT Lesson Guide
PowerPoint Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk Lesson Guide
PowerPoint Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment
Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities Lesson Guide
PowerPoint Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1 Lesson Guide
PowerPoint Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2 Lesson Guide
PowerPoint Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT Lesson Guide
PowerPoint Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment
Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary Lesson Guide
PowerPoint Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers Lesson Guide
PowerPoint ASCII Chart Handout
4.1.3 - Encoding Lesson Guide
PowerPoint Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts Lesson Guide
PowerPoint Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography Lesson Guide
PowerPoint Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI Lesson Guide
PowerPoint Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting Lesson Guide
PowerPoint Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
Unit 5 - Devices &s; Networks
Unit 5 - Assessment
Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components Lesson Guide
PowerPoint Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections Lesson Guide
PowerPoint Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming Lesson Guide
PowerPoint Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network Lesson Guide
PowerPoint Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols Lesson Guide
PowerPoint Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
Unit 6 - Law &s; Ethics
Unit 6 - Assessment
Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics Lesson Guide
PowerPoint Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
Unit 7 - Reconnaissance
Unit 7 - Assessment
Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking Lesson Guide
PowerPoint Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS Lesson Guide
PowerPoint Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup Lesson Guide
PowerPoint Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks Lesson Guide
PowerPoint Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning Lesson Guide
PowerPoint Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
Unit 8 - Network &s; System Threats
Unit 8 - Assessment
Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking Lesson Guide
PowerPoint Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks Lesson Guide
PowerPoint Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing Lesson Guide
PowerPoint Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs Lesson Guide
PowerPoint Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits Lesson Guide
PowerPoint Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario Lesson Guide
PowerPoint Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools Lesson Guide
PowerPoint Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons Lesson Guide
PowerPoint Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
Unit 9 - Securing Online Components
Unit 9 - Assessment
Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics Lesson Guide
PowerPoint Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities Lesson Guide
PowerPoint Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats Lesson Guide
PowerPoint Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection Lesson Guide
PowerPoint Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
Unit 10 - Encryption Security Tools
Unit 10 - Assessment
Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption Lesson Guide
PowerPoint Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption Lesson Guide
PowerPoint Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security Lesson Guide
PowerPoint Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT