Foundation of Cybersecurity
*********
*********
*********
*********
*********
*********
*********
*********
*********
Resources you may need and select Web addresses you may need (Below)
*********
*********
*********
*********
*********
curriculum outline below: https://cyber.instructure.com/courses/243
----------------------- September 30, 2024
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing Lesson Guide
PowerPoint
2.2.2 - OSINT Lesson Guide
PowerPoint Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk Lesson Guide
PowerPoint Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment
Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities Lesson Guide
PowerPoint Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1 Lesson Guide
PowerPoint Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2 Lesson Guide
PowerPoint Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT Lesson Guide
PowerPoint Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment
Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary Lesson Guide
PowerPoint Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers Lesson Guide
PowerPoint ASCII Chart Handout
4.1.3 - Encoding Lesson Guide
PowerPoint Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts Lesson Guide
PowerPoint Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography Lesson Guide
PowerPoint Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI Lesson Guide
PowerPoint Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting Lesson Guide
PowerPoint Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
Unit 5 - Devices &s; Networks
Unit 5 - Assessment
Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components Lesson Guide
PowerPoint Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections Lesson Guide
PowerPoint Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming Lesson Guide
PowerPoint Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network Lesson Guide
PowerPoint Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols Lesson Guide
PowerPoint Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
Unit 6 - Law &s; Ethics
Unit 6 - Assessment
Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics Lesson Guide
PowerPoint Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
Unit 7 - Reconnaissance
Unit 7 - Assessment
Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking Lesson Guide
PowerPoint Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS Lesson Guide
PowerPoint Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup Lesson Guide
PowerPoint Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks Lesson Guide
PowerPoint Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning Lesson Guide
PowerPoint Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
Unit 8 - Network &s; System Threats
Unit 8 - Assessment
Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking Lesson Guide
PowerPoint Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks Lesson Guide
PowerPoint Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing Lesson Guide
PowerPoint Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs Lesson Guide
PowerPoint Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits Lesson Guide
PowerPoint Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario Lesson Guide
PowerPoint Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools Lesson Guide
PowerPoint Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons Lesson Guide
PowerPoint Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
Unit 9 - Securing Online Components
Unit 9 - Assessment
Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics Lesson Guide
PowerPoint Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities Lesson Guide
PowerPoint Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats Lesson Guide
PowerPoint Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection Lesson Guide
PowerPoint Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
Unit 10 - Encryption Security Tools
Unit 10 - Assessment
Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption Lesson Guide
PowerPoint Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption Lesson Guide
PowerPoint Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security Lesson Guide
PowerPoint Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT
*********
*********