All posts by mistermarmolejo

CYBER.ORG – 6.1.4 – Steganography

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.4 – Steganography

Assignment:

  1. Begin reading the 6.1.4 – Steganography.pptx presentation.
  2. Complete the lab in the Lab – Steganography.pptx presentation.
  3. Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post. We will use these images in tomorrow’s class session. (So keep your messages classy!)
  4. During tomorrow’s Late Start class session, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
  5. A Google Form will be provided to answer the Case Study questions tomorrow morning.

Assigned: March 23rd, 2021

Teacher Pacing Due Date: March 24th, 2021

CYBER.ORG – 6.1.3 – Hashing and Digital Signatures

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.3 – Hashing and Digital Signatures

Assignment:

  1. Begin reading the 6.1.3 – Hashing and Digital Signatures.pptx presentation.
  2. Complete the lab in the Lab – Collision.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 22nd, 2021

Teacher Pacing Due Date: March 23rd, 2021

CYBER.ORG – 6.2.4 – Hashing Algorithms

Objective: Explain cryptography algorithms and their basic characteristics.

Resources:

  • See PowerPoint presentation: 6.2.4 – Hashing Algorithms

Assignment:

  1. Begin reading the 6.2.4 – Hashing Algorithms.pptx presentation.
  2. Complete the lab in the Lab – File Hashing.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 19th, 2021

Teacher Pacing Due Date: March 22nd, 2021

CYBER.ORG – 5.8.1 – Data Destruction

Objective: Given a scenario, carry out data security and privacy practices.

Resources:

  • See PowerPoint presentation: 5.8.1 – Data Destruction

Assignment:

  1. Begin reading the 5.8.1 – Data Destruction.pptx presentation.
  2. Complete the lab in the Lab – Data Sanitizing.pptx presentation.
  3. Read the Case Study – Data Destruction document and be prepared to answer the questions at the end.
  4. A Google Form will be provided to answer the Case Study questions on March 18th.

Assigned: March 17th, 2021

Teacher Pacing Due Date: March 18th, 2021

CYBER.ORG – 2.2.1L – Wireshark Lab

Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.

Resources:

  • See PowerPoint presentation: Lab – Wireshark.pptx

Assignment:

  1. Begin reading the Lab – Wireshark.pptx presentation.
  2. This lab focuses on the use of the Wireshark application to intercept and analyze network packets.
  3. Use the Kali Linux virtual console at https://uscyberrange.org/ to complete the steps provided in the lab presentation.

Assigned: February 24th, 2021

Teacher Pacing Due Date: February 25th, 2021

CYBER.ORG – 2.2.1 – Software Security Tools

Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.

Resources:

  • See PowerPoint presentation: 2.2.1 – Software Security Tools

Assignment:

  1. Begin reading the 2.2.1 – Software Security Tools presentation. This lesson includes an overview on software tools that are widely used in cybersecurity.
  2. Review last week’s presentations to prepare for the Command Line Security Tools quiz tomorrow.

Assigned: February 22nd, 2021

Teacher Pacing Due Date: February 23rd, 2021

CYBER.ORG – 2.2.2L – Command Line Security Tools Lab Work

Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.

Resources:

  • See PowerPoint presentations: Lab – ip-ifconfig.pptx, Lab – TCPDump.pptx, Lab – Traceroute.pptx

Assignment:

  1. Begin reading the Lab – ip-ifconfig.pptx, Lab – TCPDump.pptx, Lab – Traceroute.pptx. These lessons will provide practice with three very useful command line tools used in cybersecurity.
  2. Follow the instructions in each of the Lab presentations.
  3. The TCPDump lab will produce a file that you will need to upload to today’s assignment post in our Google Classroom.
  4. The Traceroute lab will ask questions that you will be required to answer in a form posted in the Google Classroom.
  5. These labs are self paced, but do your best to complete them by the end of the day on Friday, February 19th.

Assigned: February 18th, 2021

Teacher Pacing Due Date: February 19th, 2021

CYBER.ORG 2.2.2 – Command Line Security Tools

Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.

Resources:

  • See PowerPoint presentation: 2.2.2 – Command Line Security Tools

Assignment:

  1. Begin reading the 2.2.2 – Command Line Security Tools presentation. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
  2. Download the Linux Commands Cheat Sheet.pdf file to use as a quick resource for the useful Linux commands and tools that we have studied thus far.

Assigned: February 16th, 2021
Teacher Pacing Due Date: February 17th, 2021