Foundation of Cybersecurity
*********
*********
Due Date: September 23, 2024
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Unit 5 - IT Concepts

Complete the following.

 




*********
*********
Due Date: September 23, 2024
  

A2.1.1 - Threat Actors

A2.1.1 - Threat Actors - Lesson Notes - Read this. Copy the document found below into a google document. Answer the questions in your google document. Highlight the answer in yellow. Name the the google document "A2.1.1 Threat Actors Questions" Title: "A2.1.1 Threat Actors Questions". Modify the Standard heading with your information. Amanda Success (Period 9) Monday December 25, 2023 Seat 99 (Grade level 13) Cyber Capstone A2.1.1 Threat Actors Questions this - Click here. Turn this into google classroom.

*********
*********
Due Date: September 24, 2024
  

A2.1.1 - Threat Actors Lab

Lab 2.1.1 - Social Engineering Toolkit read this See image below: When you get to page 8, Screen print what you have. Your file name is PX_lastname_Threat.png Turn it in to google classroom.

*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

Note: To copy and paste between the Linux virtual enviroment and you windows 
enviroment. You need to use Ctrl Shift Alt.

*********
*********

curriculum outline below: https://cyber.instructure.com/courses/243

----------------------- September 23, 2024 Section 1.1 - CIA Triad and Authentication Lesson Plan A1.1.1 - Intro to Security Concepts Lesson Guide PowerPoint Activity - Understanding the CIA Triad Activity - Understanding the CIA Triad Answers Activity - CIA Triad Card Game Activity - CIA Triad Card Game Answers B1.1.2 - Authentication Lesson Guide PowerPoint Activity - Testing Password Strength Activity - Safe Password Poster Instructions Activity - Creating a Safe Password 1.1.3 - Authentication and Password Attacks Lesson Guide PowerPoint Activity - Have you been Pwned? C1.1.4 - Password Hashing Lesson Guide PowerPoint Activity - Hashing &s; Salts with Cyber Chef Activity - Our Rainbow Table spreadsheet Activity - NIST Password Guidelines Worksheet Activity - NIST Guidelines Article 1 Activity - NIST Guidelines Article 2 D1.1.5 - Methods of Authentication Lesson Guide PowerPoint Activity - Which Authentication Activity - Which Authentication Samples Answers Activity - Extension - Biometric Authentication Product Pitch Section 1.2 - Identifying Security Threats Lesson Plan E1.2.1 - Malicious Code - Part 1 Lesson Guide PowerPoint Activity - Historic Malware - Teacher Activity - Historic Malware - Student Activity - Historic Malware - Reference Articles Activity - Historic Malware Template Activity - Malware Notes Sheet F1.2.2 - Malicious Code - Part 2 Lesson Guide PowerPoint FSection 1.3 - Intro to CLI (Command Line Interface) Lesson Plan G1.3.1 - Virtualization Lesson Guide PowerPoint HH.Lab - Online Virtual Machine Access II.Lab - Online Virtual Machine Access PPT J1.3.2 - Command Line Interface - Linux Lesson Guide PowerPoint Lab - Terminus Part 1 KK.Lab - Terminus Part 1 Answers LL.Lab - Terminus Part 1 Map MM.Lab - Terminus Part 1 PPT NN.Lab - Password Cracking with John the Ripper PP.Lab - Password Cracking with John the Ripper Answers QQ.Lab - Password Cracking with John the Ripper PPT Linux Commands Reference Sheet RR.Lab - Extension - Windows CLI SS.Lab - Extension - Windows CLI PPT Unit 2 - Human Factor Unit 2 - Assessment Section 2.1 - Social Engineering Lesson Plan 2.1.1 - Social Engineering Lesson Guide PowerPoint Activity - 7 Steps of Hacking Activity - 7 Steps of Hacking Answers Activity - Extension - Social Engineering PSA Video Project Activity - Extension - Social Engineering PSA Video Project Rubric Lab - Social Engineering Toolkit Lab - Social Engineering Toolkit PPT Section 2.2 - Phishing and OSINT Lesson Plan 2.2.1 - Phishing Lesson Guide PowerPoint 2.2.2 - OSINT Lesson Guide PowerPoint Activity - OSINT Report on Tony Stark Activity - OSINT Report on Tony Stark Answers 2.2.3 - Phishing Myself Project Activity - Phishing Myself Activity - Phishing Myself Product Template Activity - Phishing Myself Rubric 2.2.4 - Mitigating the Human Risk Lesson Guide PowerPoint Activity - SANS Clean Desk Policy Activity - SANS Clean Desk Policy Answers Unit 3 - Data Safety &s; Best Practices Unit 3 - Assessment Section 3.1 - Securing the System Lesson Plan 3.1.1 - System Vulnerabilities Lesson Guide PowerPoint Activity - CVE Named Vulnerabilities Activity - CVE Named Vulnerabilities Answer Key 3.1.2 - System Hardening Part 1 Lesson Guide PowerPoint Lab - MBSA Vulnerability Scan Lab - MBSA Vulnerability Scan Answer Key Lab - MBSA Vulnerability Scan PPT Activity - Extension - Benchmark Selections Project Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference 3.1.3 - System Hardening Part 2 Lesson Guide PowerPoint Activity - Bingo Teacher Instructions Activity - Bingo Game Securing the System PPT Activity - Bingo Blank Sheets Activity - Bingo Prefilled Cards Section 3.2 - IoT Threat Modeling Lesson Plan 3.2.1 - Threat Modeling &s; IOT Lesson Guide PowerPoint Activity - IoT Spoons Game Teacher Instructions Activity - IoT Spoons Game Activity - My IoT Threat Model Unit 4 - Cryptography &s; Linux Unit 4 - Assessment Section 4.1 - Bit, Binary, &s; Encoding Lesson Plan 4.1.1 - Bits, Bytes, and Binary Lesson Guide PowerPoint Activity - Binary Magic Cards Activity - Binary Magic Cards Instructions Activity - Binary to Decimal Worksheet Activity - Binary to Decimal Worksheet Answers 4.1.2 - Hexadecimal Numbers Lesson Guide PowerPoint ASCII Chart Handout 4.1.3 - Encoding Lesson Guide PowerPoint Activity - CTF Introduction Activity - Extension - Encoding on Mars PPT Activity - Extension - Article: Encoding on Mars Lab - Decoding with CTF Challenges Lab - Decoding with CTF Challenges Answers Lab - Decoding with CTF Challenges PPT Section 4.2 - Cryptography Basics Concepts Lesson Plan 4.2.1 - Cryptography Basic Concepts Lesson Guide PowerPoint Activity - Breaking Ciphers Activity - Breaking Ciphers Answers Activity - Vigenere Try It Teacher Activity - Optional Scavenger Hunt Instructions Activity - Optional Scavenger Hunt Clues Activity - Optional Scavenger Hunt Handout 4.2.2 - Steganography Lesson Guide PowerPoint Lab - Steganography CTF Lab - Steganography CTF Answers Lab - Steganography PPT Section 4.3 - Advanced Linux CLI Lesson Plan 4.3.1 - Advanced Linux CLI Lesson Guide PowerPoint Lab - Terminus Part 2 Lab - Terminus Part 2 Answers Lab - Terminus Part 2 PPT Lab - Searching Files with Grep Lab - Searching Files with Grep Answers Lab - Searching Files with Grep PPT 4.3.2 - Scripting Lesson Guide PowerPoint Lab - Scripting in Linux Lab - Scripting in Linux Answers Lab - Scripting in Linux PPT Section 4.4 - Privacy vs Security Lesson Plan 4.4.1 - Privacy vs Security Debate Activity - Debate Instructions Activity - Debate Rubric Activity - Debate Instructor Resources Activity - Debate Privacy Resources Activity - Debate Security Resources Unit 5 - Devices &s; Networks Unit 5 - Assessment Section 5.1 - Computer Components Lesson Plan 5.1.1 - Computer Components Lesson Guide PowerPoint Lab - Installing PC Components Lab - Installing PC Components PPT Section 5.2 - Networking Fundamentals Lesson Plan 5.2.1 - Network Connections Lesson Guide PowerPoint Activity - Net Puzzles Activity - Net Puzzles Answers 5.2.2 - Network Naming Lesson Guide PowerPoint Lab - ARP with Wireshark Lab - ARP with Wireshark Answers Lab - ARP with Wireshark PPT Section 5.3 - Protocols &s; Packets Lesson Plan 5.3.1 - Communicating in a Network Lesson Guide PowerPoint Activity - Mobster Net Instructions Tags - Do Not Deliver Tags - Deliver 5.3.2 - Packet Delivery &s; Protocols Lesson Guide PowerPoint Lab - Instructor PPT - Packet Analysis with Wireshark Lab - Teacher Notes - Packet Analysis with Wireshark Lab - Packet Analysis with Wireshark Student Worksheet Lab - Packet Analysis with Wireshark Answers Unit 6 - Law &s; Ethics Unit 6 - Assessment Section 6.1 - Law &s; Ethics Lesson Plan 6.1.1 - Law &s; Ethics Lesson Guide PowerPoint Activity - Cyber Crime and Punishment Poster Activity - Cyber Crime and Punishment Poster Instructions Activity - Ethics Agreement Activity - US Laws on Cybercrimes Activity - Crime Articles zipped folder Unit 7 - Reconnaissance Unit 7 - Assessment Section 7.1 - Recon Intro and Google Dorking Lesson Plan 7.1.1 - Intro and Google Dorking Lesson Guide PowerPoint Activity - Recon with Google Dorks Activity - Recon with Google Dorks Answers Section 7.2 - WHOIS and Nslookup Lesson Plan 7.2.1 - Recon with WHOIS Lesson Guide PowerPoint Lab - Recon with WHOIS Lab - Recon with WHOIS Answers Lab - Recon with WHOIS PPT 7.2.2 - Recon with Nslookup Lesson Guide PowerPoint Lab - Using Nslookup Lab - Using Nslookup Answers Lab - Using Nslookup PPT Section 7.3 - Network Scanning Lesson Plan 7.3.1 - IP Address &s; Subnet Masks Lesson Guide PowerPoint Activity - Infection Detection Instructions Activity - Infection Detection Print IP Addresses Activity - Infection Detection PrintSwitch Net IDs 7.3.2 - Recon with Scanning Lesson Guide PowerPoint Lab - Nmap &s; Zenmap Scanning Lab - Nmap &s; Zenmap Scanning Answers Lab - Nmap &s; Zenmap Scanning PPT Unit 8 - Network &s; System Threats Unit 8 - Assessment Section 8.1 - Net Attacks DoS Lesson Plan 8.1.1 - CLI for Networking Lesson Guide PowerPoint Lab - CLI for Networking Lab - CLI for Networking Answers Lab - CLI for Networking PPT 8.1.2 - DoS Attacks Lesson Guide PowerPoint Lab - SYN Flood DoS Attack Lab - SYN Flood DoS Attack Answers Lab - SYN Flood DoS Attack PPT Section 8.2 - Spoofing &s; Sniffing Lesson Plan 8.2.1 - Spoofing &s; Sniffing Lesson Guide PowerPoint Lab - ARP Spoofing for DoS &s; AiTM Attacks Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT Section 8.3 - Wireless, Mobile, &s; VPNs Lesson Plan 8.3.1 - Wireless, Mobile, &s; VPNs Lesson Guide PowerPoint Lab - SSH Tunneling for Privacy Lab - SSH Tunneling for Privacy PPT Section 8.4 - Pentesting &s; Exploits Lesson Plan 8.4.1 - Pentesting &s; Exploits Lesson Guide PowerPoint Lab - Exploring Metasploit Lab - Exploring Metasploit Answers Lab - Exploring Metasploit PPT 8.4.2 - Attack Scenario Lesson Guide PowerPoint Lab - Exfiltration with MimiKatz Lab - Exfiltration wtih MimiKatz Answers Lab - Exfiltration with MimiKatz PPT Lab - Post-Exploitation Lab - Post-Exploitation Answers Lab - Post-Exploitation PPT 8.4.3 - Threat Hunting Tools Lesson Guide PowerPoint Lab - Hunting a BackDoor Lab - Hunting a BackDoor PPT Section 8.5 - Cyber War Lesson Plan 8.5.1 - Cyber Weapons Lesson Guide PowerPoint Activity - Trial of EternalBlue Project Instructions Activity - Trial of EternalBlue Project Timeline Infographic Activity - Trial of EternalBlue Project Sandworm Resources Activity - Trial of EternalBlue Project North Korea Resources Activity - Trial of EternalBlue Project Brokers Resources Activity - Trial of EternalBlue Project NSA Resources Unit 9 - Securing Online Components Unit 9 - Assessment Section 9.1 - Basic Web Concepts Lesson Plan 9.1.1 - Web Basics Lesson Guide PowerPoint Lab - Exploring Developers Tool Lab - Exploring Developers Tool PPT Section 9.2 - Web Vulnerabilities Lesson Plan 9.2.1 - Web Vulnerabilities Lesson Guide PowerPoint Lab - Cookie Manipulation Lab - Cooking Manipulation PPT 9.2.2 - User Input Threats Lesson Guide PowerPoint Lab - Command Injection &s; XSS Lab - Command Injection &s; XSS PPT Section 9.3 - Databases and SQL Injection Lesson Plan 9.3.1 - Databases and SQL Injection Lesson Guide PowerPoint Lab - Basic SQL Commands Lab - Basic SQL Commands Answers Lab - Basic SQL Commands PPT Lab - Exploring SQL Injection Lab - Exploring SQL Injection PPT Unit 10 - Encryption Security Tools Unit 10 - Assessment Section 10.1 - Symmetric and Asymmetric Encryption Lesson Plan 10.1.1 - Symmetric Encryption Lesson Guide PowerPoint Activity - Creating a Key Exchange 10.1.2 - Asymmetric Encryption Lesson Guide PowerPoint Activity - Investigating RSA Keypairs Section 10.2 - SSL for Online Security Lesson Plan 10.2.1 - SSL for Online Security Lesson Guide PowerPoint Lab - Decrypting SSL Lab - Decrypting SSL Answers Lab - Decrypting SSL PPT














*********
*********