Foundation of Cybersecurity
*********
*********
Due Date: October 8, 2024

D2_2_2 Cusack Phishing

We will be creating a phishing e-mail to fake out Mr. Cusack
Click here to complete your assignment.

*********
*********
*********
*********
*********

Resources you may need and select Web addresses you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

Note: To copy and paste between the Linux virtual enviroment and you windows 
enviroment. You need to use Ctrl Shift Alt.

*********
*********

curriculum outline below: https://cyber.instructure.com/courses/243

----------------------- October 7, 2024 D2.2.3 - Phishing Myself Project Activity - Phishing Myself Activity - Phishing Myself Product Template Activity - Phishing Myself Rubric E2.2.4 - Mitigating the Human Risk Lesson Guide PowerPoint Activity - SANS Clean Desk Policy Activity - SANS Clean Desk Policy Answers Unit 3 - Data Safety &s; Best Practices Unit 3 - Assessment Section 3.1 - Securing the System Lesson Plan F3.1.1 - System Vulnerabilities Lesson Guide PowerPoint Activity - CVE Named Vulnerabilities Activity - CVE Named Vulnerabilities Answer Key G3.1.2 - System Hardening Part 1 Lesson Guide PowerPoint Lab - MBSA Vulnerability Scan Lab - MBSA Vulnerability Scan Answer Key Lab - MBSA Vulnerability Scan PPT Activity - Extension - Benchmark Selections Project Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference H3.1.3 - System Hardening Part 2 Lesson Guide PowerPoint Activity - Bingo Teacher Instructions Activity - Bingo Game Securing the System PPT Activity - Bingo Blank Sheets Activity - Bingo Prefilled Cards Section 3.2 - IoT Threat Modeling Lesson Plan J3.2.1 - Threat Modeling &s; IOT Lesson Guide PowerPoint Activity - IoT Spoons Game Teacher Instructions Activity - IoT Spoons Game Activity - My IoT Threat Model Unit 4 - Cryptography &s; Linux Unit 4 - Assessment Section 4.1 - Bit, Binary, &s; Encoding Lesson Plan K4.1.1 - Bits, Bytes, and Binary Lesson Guide PowerPoint Activity - Binary Magic Cards Activity - Binary Magic Cards Instructions Activity - Binary to Decimal Worksheet Activity - Binary to Decimal Worksheet Answers K4.1.2 - Hexadecimal Numbers Lesson Guide PowerPoint ASCII Chart Handout L4.1.3 - Encoding Lesson Guide PowerPoint Activity - CTF Introduction Activity - Extension - Encoding on Mars PPT Activity - Extension - Article: Encoding on Mars Lab - Decoding with CTF Challenges Lab - Decoding with CTF Challenges Answers Lab - Decoding with CTF Challenges PPT Section 4.2 - Cryptography Basics Concepts Lesson Plan 4.2.1 - Cryptography Basic Concepts Lesson Guide PowerPoint Activity - Breaking Ciphers Activity - Breaking Ciphers Answers Activity - Vigenere Try It Teacher Activity - Optional Scavenger Hunt Instructions Activity - Optional Scavenger Hunt Clues Activity - Optional Scavenger Hunt Handout 4.2.2 - Steganography Lesson Guide PowerPoint Lab - Steganography CTF Lab - Steganography CTF Answers Lab - Steganography PPT Section 4.3 - Advanced Linux CLI Lesson Plan 4.3.1 - Advanced Linux CLI Lesson Guide PowerPoint Lab - Terminus Part 2 Lab - Terminus Part 2 Answers Lab - Terminus Part 2 PPT Lab - Searching Files with Grep Lab - Searching Files with Grep Answers Lab - Searching Files with Grep PPT 4.3.2 - Scripting Lesson Guide PowerPoint Lab - Scripting in Linux Lab - Scripting in Linux Answers Lab - Scripting in Linux PPT Section 4.4 - Privacy vs Security Lesson Plan 4.4.1 - Privacy vs Security Debate Activity - Debate Instructions Activity - Debate Rubric Activity - Debate Instructor Resources Activity - Debate Privacy Resources Activity - Debate Security Resources Unit 5 - Devices &s; Networks Unit 5 - Assessment Section 5.1 - Computer Components Lesson Plan 5.1.1 - Computer Components Lesson Guide PowerPoint Lab - Installing PC Components Lab - Installing PC Components PPT Section 5.2 - Networking Fundamentals Lesson Plan 5.2.1 - Network Connections Lesson Guide PowerPoint Activity - Net Puzzles Activity - Net Puzzles Answers 5.2.2 - Network Naming Lesson Guide PowerPoint Lab - ARP with Wireshark Lab - ARP with Wireshark Answers Lab - ARP with Wireshark PPT Section 5.3 - Protocols &s; Packets Lesson Plan 5.3.1 - Communicating in a Network Lesson Guide PowerPoint Activity - Mobster Net Instructions Tags - Do Not Deliver Tags - Deliver 5.3.2 - Packet Delivery &s; Protocols Lesson Guide PowerPoint Lab - Instructor PPT - Packet Analysis with Wireshark Lab - Teacher Notes - Packet Analysis with Wireshark Lab - Packet Analysis with Wireshark Student Worksheet Lab - Packet Analysis with Wireshark Answers Unit 6 - Law &s; Ethics Unit 6 - Assessment Section 6.1 - Law &s; Ethics Lesson Plan 6.1.1 - Law &s; Ethics Lesson Guide PowerPoint Activity - Cyber Crime and Punishment Poster Activity - Cyber Crime and Punishment Poster Instructions Activity - Ethics Agreement Activity - US Laws on Cybercrimes Activity - Crime Articles zipped folder Unit 7 - Reconnaissance Unit 7 - Assessment Section 7.1 - Recon Intro and Google Dorking Lesson Plan 7.1.1 - Intro and Google Dorking Lesson Guide PowerPoint Activity - Recon with Google Dorks Activity - Recon with Google Dorks Answers Section 7.2 - WHOIS and Nslookup Lesson Plan 7.2.1 - Recon with WHOIS Lesson Guide PowerPoint Lab - Recon with WHOIS Lab - Recon with WHOIS Answers Lab - Recon with WHOIS PPT 7.2.2 - Recon with Nslookup Lesson Guide PowerPoint Lab - Using Nslookup Lab - Using Nslookup Answers Lab - Using Nslookup PPT Section 7.3 - Network Scanning Lesson Plan 7.3.1 - IP Address &s; Subnet Masks Lesson Guide PowerPoint Activity - Infection Detection Instructions Activity - Infection Detection Print IP Addresses Activity - Infection Detection PrintSwitch Net IDs 7.3.2 - Recon with Scanning Lesson Guide PowerPoint Lab - Nmap &s; Zenmap Scanning Lab - Nmap &s; Zenmap Scanning Answers Lab - Nmap &s; Zenmap Scanning PPT Unit 8 - Network &s; System Threats Unit 8 - Assessment Section 8.1 - Net Attacks DoS Lesson Plan 8.1.1 - CLI for Networking Lesson Guide PowerPoint Lab - CLI for Networking Lab - CLI for Networking Answers Lab - CLI for Networking PPT 8.1.2 - DoS Attacks Lesson Guide PowerPoint Lab - SYN Flood DoS Attack Lab - SYN Flood DoS Attack Answers Lab - SYN Flood DoS Attack PPT Section 8.2 - Spoofing &s; Sniffing Lesson Plan 8.2.1 - Spoofing &s; Sniffing Lesson Guide PowerPoint Lab - ARP Spoofing for DoS &s; AiTM Attacks Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT Section 8.3 - Wireless, Mobile, &s; VPNs Lesson Plan 8.3.1 - Wireless, Mobile, &s; VPNs Lesson Guide PowerPoint Lab - SSH Tunneling for Privacy Lab - SSH Tunneling for Privacy PPT Section 8.4 - Pentesting &s; Exploits Lesson Plan 8.4.1 - Pentesting &s; Exploits Lesson Guide PowerPoint Lab - Exploring Metasploit Lab - Exploring Metasploit Answers Lab - Exploring Metasploit PPT 8.4.2 - Attack Scenario Lesson Guide PowerPoint Lab - Exfiltration with MimiKatz Lab - Exfiltration wtih MimiKatz Answers Lab - Exfiltration with MimiKatz PPT Lab - Post-Exploitation Lab - Post-Exploitation Answers Lab - Post-Exploitation PPT 8.4.3 - Threat Hunting Tools Lesson Guide PowerPoint Lab - Hunting a BackDoor Lab - Hunting a BackDoor PPT Section 8.5 - Cyber War Lesson Plan 8.5.1 - Cyber Weapons Lesson Guide PowerPoint Activity - Trial of EternalBlue Project Instructions Activity - Trial of EternalBlue Project Timeline Infographic Activity - Trial of EternalBlue Project Sandworm Resources Activity - Trial of EternalBlue Project North Korea Resources Activity - Trial of EternalBlue Project Brokers Resources Activity - Trial of EternalBlue Project NSA Resources Unit 9 - Securing Online Components Unit 9 - Assessment Section 9.1 - Basic Web Concepts Lesson Plan 9.1.1 - Web Basics Lesson Guide PowerPoint Lab - Exploring Developers Tool Lab - Exploring Developers Tool PPT Section 9.2 - Web Vulnerabilities Lesson Plan 9.2.1 - Web Vulnerabilities Lesson Guide PowerPoint Lab - Cookie Manipulation Lab - Cooking Manipulation PPT 9.2.2 - User Input Threats Lesson Guide PowerPoint Lab - Command Injection &s; XSS Lab - Command Injection &s; XSS PPT Section 9.3 - Databases and SQL Injection Lesson Plan 9.3.1 - Databases and SQL Injection Lesson Guide PowerPoint Lab - Basic SQL Commands Lab - Basic SQL Commands Answers Lab - Basic SQL Commands PPT Lab - Exploring SQL Injection Lab - Exploring SQL Injection PPT Unit 10 - Encryption Security Tools Unit 10 - Assessment Section 10.1 - Symmetric and Asymmetric Encryption Lesson Plan 10.1.1 - Symmetric Encryption Lesson Guide PowerPoint Activity - Creating a Key Exchange 10.1.2 - Asymmetric Encryption Lesson Guide PowerPoint Activity - Investigating RSA Keypairs Section 10.2 - SSL for Online Security Lesson Plan 10.2.1 - SSL for Online Security Lesson Guide PowerPoint Lab - Decrypting SSL Lab - Decrypting SSL Answers Lab - Decrypting SSL PPT














*********
*********