Foundation of Cybersecurity
*********
*********
Due Date: September 13, 2024

Linux Permission for files and directories Assignment

Linux Permissions Using chmod and Octal Numbers In Linux, file permissions are a way to control who can read, write, or execute a file or directory. The chmod command is used to change the permissions of a file or directory, often represented in an octal (numeric) format. Your task is to take notes on the use of the permission command chmod based on Mr. Cusack's instructions. You will write the notes displayed on the board onto paper, ensuring that you include a standard heading. Name your file as follows: PX_LinuxPermissions_lastname.png. Once completed, submit a photo of your notes to Google Classroom. Read my notes below: File Permissions Overview Each file or directory has three sets of permissions, corresponding to three groups: 1. Owner (User): The person who owns the file. 2. Group: Other users who belong to the file's group. 3. Others (World): All other users on the system. Each set has three types of permissions: - Read (r): Ability to view the file's content. - Write (w): Ability to modify the file's content. - Execute (x): Ability to run the file (if it's a script or program) or access a directory. Octal Numbers in chmod Each of the three permissions (read, write, execute) is represented by a number: - Read (r) = 4 - Write (w) = 2 - Execute (x) = 1 - No permission (-) = 0 To represent permissions in octal form, you sum the values for each group of permissions (owner, group, others). Examples of Octal Permissions Examples: - rwx = 4 + 2 + 1 = 7 (read, write, execute) - rw- = 4 + 2 + 0 = 6 (read, write, no execute) - r-- = 4 + 0 + 0 = 4 (read-only) So, a three-digit octal number defines the permissions for owner, group, and others. For example: - 755: - Owner: rwx (4 + 2 + 1 = 7) - Group: r-x (4 + 0 + 1 = 5) - Others: r-x (4 + 0 + 1 = 5) This means the owner can read, write, and execute the file, while the group and others can only read and execute it. Using chmod with Octal Numbers The chmod command is used to set these permissions. For example: chmod 755 filename This sets the permissions so that: - The owner can read, write, and execute. - The group can read and execute. - Others can read and execute. Common Permission Codes: - 777: Everyone can read, write, and execute. - 755: Owner has full permissions, others can read and execute. - 644: Owner can read and write, others can only read. - 600: Only the owner can read and write. Changing Permissions with Symbolic Mode You can also use symbolic notation: - chmod u+rwx adds read, write, and execute permissions for the owner (user). - chmod g-w removes write permission from the group. - chmod o+x adds execute permission for others. This approach allows more granular control without using octal numbers.

*********
*********
Due Date: September 11, 2024
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 







*********
*********
Due Date: September 13, 2023
Mr. Cusack will lecture on linux.



Insert a standard paper.
Title Basic Linux

Click here and read about the nano command.

Click here and read about basic linux info.

Click here and read about linux permission structure.

Click here and learn in great detail of the linux ls command.

Use nano to build a file with Linux Commands.
The name of the file will be PX_lastname_BasicLinux.py
(Be sure to save a copy of you python program in google drive under your class directory)

nano P7_lastname_BasicLinux
Typer a brief summary of each linux command.
(Save the file in a google document.)

You will need to drop off the following files off into google classroom.
Px_lastname_BasicLinux.py - list of linux commands and definitions.
Px_lastname_BasicLinux.png - Screen pring of the Python program
Px_lastname_BasicLinux.mp4 - Video recording of you using all the linux command we have worked with.
Px_lastname_BasicLinux.png - Picture of your written notes.

*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

Note: To copy and paste between the Linux virtual enviroment and you windows 
enviroment. You need to use Ctrl Shift Alt.

*********
*********

curriculum outline below: https://cyber.instructure.com/courses/243

	
Course Content
Unit 1 - Foundations and Threats
Unit 1 Assessment

Section 0.1 - First Day Info &s; Ethics Agreement
Lesson Plan
0.1.1 - First Day Info &s; Ethics Agreement	Lesson Guide
PowerPoint	Activity - Course Interest Survey
Ethics Agreement
Section 1.1 - CIA Triad and Authentication
Lesson Plan
A1.1.1 - Intro to Security Concepts	Lesson Guide
PowerPoint	Activity - Understanding the CIA Triad
Activity - Understanding the CIA Triad Answers
Activity - CIA Triad Card Game
Activity - CIA Triad Card Game Answers
B1.1.2 - Authentication	Lesson Guide
PowerPoint	Activity - Testing Password Strength
Activity - Safe Password Poster Instructions
Activity - Creating a Safe Password
1.1.3 - Authentication and Password Attacks	Lesson Guide
PowerPoint	Activity - Have you been Pwned?
C1.1.4 - Password Hashing	Lesson Guide
PowerPoint	Activity - Hashing &s; Salts with Cyber Chef
Activity - Our Rainbow Table spreadsheet
Activity - NIST Password Guidelines Worksheet
Activity - NIST Guidelines Article 1
Activity - NIST Guidelines Article 2
D1.1.5 - Methods of Authentication	Lesson Guide
PowerPoint	Activity - Which Authentication
Activity - Which Authentication Samples Answers
Activity - Extension - Biometric Authentication Product Pitch
Section 1.2 - Identifying Security Threats
Lesson Plan
E1.2.1 - Malicious Code - Part 1	Lesson Guide
PowerPoint	Activity - Historic Malware - Teacher
Activity - Historic Malware - Student
Activity - Historic Malware - Reference Articles
Activity - Historic Malware Template
Activity - Malware Notes Sheet
F1.2.2 - Malicious Code - Part 2	Lesson Guide
PowerPoint	
FSection 1.3 - Intro to CLI (Command Line Interface)
Lesson Plan
G1.3.1 - Virtualization	Lesson Guide
PowerPoint	
HH.Lab - Online Virtual Machine Access
II.Lab - Online Virtual Machine Access PPT
J1.3.2 - Command Line Interface - Linux	Lesson Guide
PowerPoint	Lab - Terminus Part 1
KK.Lab - Terminus Part 1 Answers
LL.Lab - Terminus Part 1 Map
MM.Lab - Terminus Part 1 PPT
NN.Lab - Password Cracking with John the Ripper
PP.Lab - Password Cracking with John the Ripper Answers
QQ.Lab - Password Cracking with John the Ripper PPT
Linux Commands Reference Sheet
RR.Lab - Extension - Windows CLI
SS.Lab - Extension - Windows CLI PPT
 	 	 
Unit 2 - Human Factor
Unit 2 - Assessment

Section 2.1 - Social Engineering
Lesson Plan
2.1.1 - Social Engineering	Lesson Guide
PowerPoint	Activity - 7 Steps of Hacking
Activity - 7 Steps of Hacking Answers
Activity - Extension - Social Engineering PSA Video Project
Activity - Extension - Social Engineering PSA Video Project Rubric
Lab - Social Engineering Toolkit
Lab - Social Engineering Toolkit PPT
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing	Lesson Guide
PowerPoint	
2.2.2 - OSINT	Lesson Guide
PowerPoint	Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project		Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk	Lesson Guide
PowerPoint	Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
 	 	 
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment

Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities	Lesson Guide
PowerPoint	Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1	Lesson Guide
PowerPoint	Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2	Lesson Guide
PowerPoint	Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT	Lesson Guide
PowerPoint	Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
 	 	 
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment

Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary	Lesson Guide
PowerPoint	Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers	Lesson Guide
PowerPoint	ASCII Chart Handout
4.1.3 - Encoding	Lesson Guide
PowerPoint	Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts	Lesson Guide
PowerPoint	Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography	Lesson Guide
PowerPoint	Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI	Lesson Guide
PowerPoint	Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting	Lesson Guide
PowerPoint	Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate		Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
 	 	 
Unit 5 - Devices &s; Networks
Unit 5 - Assessment

Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components	Lesson Guide
PowerPoint	Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections	Lesson Guide
PowerPoint	Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming	Lesson Guide
PowerPoint	Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network	Lesson Guide
PowerPoint	Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols	Lesson Guide
PowerPoint	Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
 	 	 
Unit 6 - Law &s; Ethics
Unit 6 - Assessment

Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics	Lesson Guide
PowerPoint	Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
 	 	 
Unit 7 - Reconnaissance
Unit 7 - Assessment

Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking	Lesson Guide
PowerPoint	Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS	Lesson Guide
PowerPoint	Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup	Lesson Guide
PowerPoint	Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks	Lesson Guide
PowerPoint	Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning	Lesson Guide
PowerPoint	Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
 	 	 
Unit 8 - Network &s; System Threats
Unit 8 - Assessment

Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking	Lesson Guide
PowerPoint	Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks	Lesson Guide
PowerPoint	Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing	Lesson Guide
PowerPoint	Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs	Lesson Guide
PowerPoint	Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits	Lesson Guide
PowerPoint	Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario	Lesson Guide
PowerPoint	Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools	Lesson Guide
PowerPoint	Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons	Lesson Guide
PowerPoint	Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
 	 	 
Unit 9 - Securing Online Components
Unit 9 - Assessment

Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics	Lesson Guide
PowerPoint	Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities	Lesson Guide
PowerPoint	Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats	Lesson Guide
PowerPoint	Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection	Lesson Guide
PowerPoint	Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
 	 	 
Unit 10 - Encryption Security Tools
Unit 10 - Assessment

Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption	Lesson Guide
PowerPoint	Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption	Lesson Guide
PowerPoint	Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security	Lesson Guide
PowerPoint	Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT	















*********
*********