Cyber Capstone
Unit 1 (Cyber.org https://cyber.instructure.com/courses/100)
*********
*********
Due Date: September 23, 2024

I2.2.2 - Principles of Social Engineering

2.2.2 - Principles of Social Engineering - Guided Notes-Read this. Lesson 2.2.2 - Principles of Social Engineering lesson-Read this. Copy the document found below into a google document under your class directory. Answer the questions in your google document. Highlight the answer in yellow. Name the the google document "2.2.2 - Principles of Social Engineering Guided" Title: "2.2.2 - Principles of Social Engineering Guided". Modify the Standard heading with your information. Amanda Success (Period 9) Monday December 25, 2023 Seat 99 (Grade level 13) Cyber Capstone 2.2.2 - Principles of Social Engineering Guided Notes-Click here. Copy the document found below into a google document under your class directory. Answer the questions in your google document. Highlight the answer in yellow. Name the the google document "2.2.2 - quiz - Principles of Social Engineering" Title: "2.2.2 - quiz - Principles of Social Engineering". Modify the Standard heading with your information. Amanda Success (Period 9) Monday December 25, 2023 Seat 99 (Grade level 13) Cyber Capstone 2.2.2 - quiz - Principles of Social Engineering Click here.

*********
*********
*********

Resources you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

Note: To copy and paste between the Linux virtual enviroment and you windows 
enviroment. You need to use Ctrl Shift Alt.

*********
*********
*********
*********
*********
*********
*********
*********
*********
*********

curriculum outline below: https://cyber.instructure.com/courses/100

----------------------- September 22, 2024 Unit 2 - Social Engineering & Access Control Unit 2 Lesson Plan I2.2.2 - Principles of Social Engineering Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Influence Campaigns Quiz : Key J2.2.3 - Phishing and Spam Lesson Notes PowerPoint Guided Notes Answer Key Lab - Credential Harvesting Case Study - Salesforce Phishing Quiz : Key K5.6.1 - Phishing Awareness Lesson Notes PowerPoint Guided Notes Answer Key Lab - Phishing Quiz : Key L2.2.4 - Misinformation and Impersonation Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Hoaxes Quiz : Key M2.2.5 - Watering Hole Attacks and Typosquatting Lesson Notes PowerPoint Guided Notes Answer Key Lab - Typosquatting Case Study - Watering Hole Quiz : Key M5.6.2 - Security Awareness Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Insider Threat Quiz : Key Unit 3 - Threats &s; Attack Surfaces Unit 3 Lesson Plan N2.4.1 - Malware Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Malware Quiz : Key P2.4.2 - Ransomware Lesson Notes PowerPoint Guided Notes Answer Key Lab - Ransomware Case Study - FBI Response to REvil Ransomware Quiz : Key Q2.4.3 - Trojans, Backdoors, and RATs Lesson Notes PowerPoint Guided Notes Answer Key QQ.Lab - Trojan RR.Lab - Backdoor SS.Lab - RAT/Bot Case Study - The TeaBot Malware Goes Global Quiz : Key T2.4.4 - Viruses, Worms, Spyware &s; Adware Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key U2.4.5 - Keyloggers Lesson Notes PowerPoint Guided Notes Answer Key UU.Lab - Intro to Keyloggers VV.Lab - Keylogger Application Quiz : Key W2.4.6 - Logic Bombs &s; Rootkits Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Logic Bomb Quiz : Key X2.2.1 - Common Attack Surfaces Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Wireless Security Quiz : Key Y2.4.8 - DoS and DDoS Attacks Lesson Notes PowerPoint Guided Notes Answer Key Lab - Denial of Service Case Study - Botnet Quiz : Key Z2.4.9 - DNS Attacks Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key A2.4.10 - Wireless, On-Path, and Replay Attacks Lesson Notes PowerPoint Guided Notes Answer Key Lab - Session Replay Case Study - Wireless Disassociation Quiz : Key B4.5.1 - Endpoint - Protocol &s; Email Security Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Heartbleed Quiz : Key C4.1.2 - Wireless Devices Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Wireless Jamming Quiz : Key D2.3.1 - Application Vulnerabilities Lesson Notes PowerPoint Guided Notes EAnswer Key Case Study - Race Conditions Case Study - iPhone Integer Overflow Quiz : Key F2.4.11 - Application Attacks Part 1 Lesson Notes PowerPoint Guided Notes GAnswer Key Lab - Directory Traversal Lab - Privilege Escalation Lab - Pass the Hash Quiz : Key H2.4.12 - Application Attacks Part 2 Lesson Notes PowerPoint Guided Notes Answer Key HH.Lab - Buffer Overflow II.Lab - Command Injection JJ.Lab - Intro CSRF KK.Lab - CSRF Application Case Study - Chrome Crash Catastrophe Quiz : Key L.4.1.4 - Application Security Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 2.3.2 - OS and Web-based Vulnerabilities Lesson Notes PowerPoint Guided Notes Answer Key Lab - SQL Injection DVWA Lab - SQL Injection Juice Shop Lab - XSS DVWA Lab - XSS Juice Shop Quiz : Key 4.5.2 - Endpoint - OS &s; Monitoring Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 2.3.3 - Hardware and Virtualization Vulnerabilities Lesson Notes PowerPoint Guided Notes Answer Key Case Study - VENOM Vulnerability Quiz : Key 2.3.4 - Supply Chain, Zero-day, and Cryptographic Vulnerabilities Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Zero Day Attack Quiz : Key 4.1.3 - Mobile Solutions Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Geolocation Quiz : Key 2.4.7 - Physical Attacks Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.2.3 - Physical Security Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key Unit 4 - Cryptographic Solutions Unit 4 Lesson Plan 1.4.2 - Encryption Lesson Notes PowerPoint Guided Notes Answer Key Lab - Linux Personal File Encryption Lab - Windows 7 Personal File Encryption Quiz : Key 1.4.4 - Obfuscation and Steganography Lesson Notes PowerPoint Guided Notes Answer Key Lab - Obfuscation Lab - Steganography Case Study - Steganography Quiz : Key 1.4.5 - Hashing, Digital Signatures, and Blockchain Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.4.1 - Public Key Infrastructure Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.4.6 - Certificates Lesson Notes PowerPoint Guided Notes Answer Key Lab - Certificates Quiz : Key 1.4.3 - Cryptographic Tools Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 2.4.13 - Cryptographic Attack Lesson Notes PowerPoint Guided Notes Answer Key Lab - Collision Quiz : Key Unit 5 - Vulnerability Analysis &s; Remediation Unit 5 Lesson Plan 4.3.1 - Identifying Vulnerabilities Lesson Notes PowerPoint Guided Notes Answer Key Lab - ip-ifconfig Case Study - Pen Testing Quiz : Key 5.5.2 - Pentesting Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Bug Bounty Quiz : Key 4.4.1 - Monitoring Resources Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 4.4.2 - Monitoring Tools Lesson Notes PowerPoint Guided Notes Answer Key Lab - Wireshark Lab - tcpdump Quiz : Key 1.2.4 - Deception and Disruption Technology Lesson Notes PowerPoint Guided Notes Answer Key Lab - Honeypot Quiz : Key 4.3.2 - Vulnerability Management Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key Unit 6 - Security Controls Unit 6 Lesson Plan 1.1.1 - Security Controls Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 3.1.2 - Architecture Considerations Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 3.2.1 - Infrastructure Considerations Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 2.5.2 - Hardening Techniques Lesson Notes PowerPoint Guided Notes Answer Key Lab - Backdoor Removal Lab - RAT Removal Lab - Backdoor Shortcut Quiz : Key 4.5.3 - Endpoint - Firewall, IDS/IPS &s; Web Filter Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 3.2.2 - Network Appliances Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 2.5.1 - Mitigation Techniques Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 3.2.3 - Secure Communication/Access and Effective Controls Lesson Notes PowerPoint Guided Notes Answer Key Case Study - NordVPN Hack Quiz : Key Unit 7 - Data Management Unit 7 Lesson Plan 3.3.1 - Data Classification and Types Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Handling Sensitive Data Quiz : Key 3.3.2 - Data Sovereignty and Protection Lesson Notes PowerPoint Guided Notes Answer Key Lab - File Hashing Quiz : Key 3.4.1 - Resilience and Recovery I Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 3.4.2 - Resilience and Recovery II Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key Unit 8 - Infrastructure &s; SecOps Unit 8 Lesson Plan 3.1.1 - Architecture and Infrastructure Concepts Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Specialized Systems Vulnerabilities Quiz : Key 4.1.1 - Hardening Targets and Secure Baselines Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Exposure Through Cloud Misconfiguration Quiz : Key 4.6.1 - Access Management Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Quantum Cryptography Quiz : Key 4.7.1 - Scripting and Automation Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key Unit 9 - Incident Response Unit 9 Lesson Plan 2.4.15 - Indicators of Malicious Activity Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Equifax Quiz : Key 4.8.1 - Incident Response Lesson Notes PowerPoint Guided Notes Answer Key Lab - Cuckoo Case Study - Incident Response Quiz : Key 4.9.1 - Logs Lesson Notes PowerPoint Guided Notes Answer Key Lab - Metadata Quiz : Key Unit 10 - Processes &s; Governance Unit 10 Lesson Plan 1.2.2 - Gap Analysis and Zero Trust Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.3.1 - Business Processes Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.3.2 - Technical Implications of Change Management Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 1.3.3 - Documentation and Version Control of Change Management Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 4.2.1 - Data Asset Management Lesson Notes PowerPoint Guided Notes Answer Key Lab - Data Sanitization Case Study - Data Destruction Quiz : Key 5.1.1 - Security Governance Lesson Notes PowerPoint Guided Notes Answer Key Case Study - The GDPR Quiz : Key Unit 11 - Risk, Audits &s; Compliance Unit 11 Lesson Plan 5.2.1 - Risk Management Lesson Notes PowerPoint Guided Notes Answer Key Case Study - Failure to Disclose Quiz : Key 5.3.1 - Third-Party Vendors Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 5.4.1 - Security Compliance Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key 5.5.1 - Audits and Attestation Lesson Notes PowerPoint Guided Notes Answer Key Quiz : Key