I can effectively navigate the Macintosh OS, and change my desktop wallpaper, mouse settings and desktop settings using the System Preferences so I can customize and configure my Mac workspace to suit my preferences.
Links:
None
Topics Discussed:
Mac OSX Ventura
Desktop
Menu Bar
System Preferences
Mouse
Dock
Icons
Finder
Trash
Launchpad
Documents
Finder Window
Finder Window Views
Safari
Google Image Search
Resolution
Assignment:
Today we’ll begin our introduction to the Macintosh operating system.
Follow along with the in-class demonstrations to learn how to:
Log in using your newly created account.
Change your password, if you wish to do so.
Navigate through the OSX Ventura operating system.
Activate and use the virtual assistant, Siri.
Identify and use items on the desktop, including the Finder, application icons, the menu bar, the dock, the trash and the Launchpad.
Use the System Preferences panel to adjust your Desktop wallpaper and your Mouse settings (enable right click).
Open a new Finder window and navigate to your Documents folder to store files and folders.
Use the Finder window to view files and folders in different ways.
Adjust the Finder Preferences to see all items on the desktop.
Use Safari to browse the web
Locate and bookmark the class website (https://netop.mistermarmolejo.com).
Use Google Image Search to find an appropriate image to personalize your desktop. (Keep it classy!)
Use the Search Tools underneath the search bar to search for Large images with higher resolutions for the best results.
Remember: for the image to look good on your desktop, it has to have a minimum horizontal resolution of 1920 pixels!
Today I’ll walk you through the process of logging in to the computer for the first time.
Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you get logged in today so you’re ready for this week’s lessons.
I can agree to abide by the class policies by reviewing the established policies and procedures to help ensure the classroom is a safe and fun place for everyone.
Links:
None.
Topics Discussed:
Classroom Policies and Procedures
Computer Acceptable Use Policy
Assignment:
Welcome back! Today we’re going to go over the class rules, or as I like to call them, the Policies and Procedures.
Society’s based on policies and procedures. Without ’em, we’re no better than poo-flinging monkeys in the jungle. Humans agree to abide by laws so we can all get along and get things accomplished with a minimum of screaming, head-bashing and poo-flinging.
The policies and procedures are pretty straightforward, and they’re all posted in the front of the room where you can see them at all times. They’re all really based on one simple thing: respect.
I’m going to show you respect at all times in the classroom, and all I ask is that you return the favor.
I also ask that you treat everyone else with respect, so that they can do the same for you.
The chairs have wheels for a reason: if you need to scoot over to collaborate with a partner, that’s great. Don’t use them to scoot all over the room, and don’t get up and wander aimlessly. Move with purpose.
Have respect for other people who are trying to get work done, and don’t bother them. Don’t steal anybody’s work (or stuff, for that matter).
Treat my stuff and the school’s stuff with respect, so that it can stay in good shape for you and for everyone else. Let me know right away if anything is marked, damaged or missing so I can address it immediately.
We’re going to have a lot of opportunities to critique the work of others in this class. Keep it respectful, positive and constructive, please. Don’t feel bad if someone else critiques your work, it’s only going to help you improve and get stronger.
I’ve got a lot of cool stuff to teach you in this class. Please don’t make it any harder for me than it already is by disrupting my class, or making it harder for the people around you to pay attention.
I promise not to come to your room and mess it up; can you do me the same courtesy? I’d appreciate it.
Don’t leave the room without my permission. I need to know where you are at all times. If you need to leave the room, please sign out on the digital sign-out sheet provided.
Read your Student Handbook! We all (you and me both) are required to abide by its policies, so it’s important to know exactly what those policies are so you don’t violate them unintentionally (Or intentionally!).
Do any of the class policies seem strange? Like something you shouldn’t have to be asked not to do? Guess what: the reason that policy’s in place is because some knucklehead decided to be a creep and had to be told to stop. Please: Don’t be that guy.
If you can agree to abide by these policies and procedures, then we can all get along. If there’s anything you feel like you can’t agree to here, let me know and we can talk it over.
I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Networking and CyberSecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for Networking and CyberSecurity 1-2H! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.
I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.
Links: None.
Topics Discussed:
Networking
Cybersecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for Networking and Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Take a look around! I’ll explain everything here very soon.
Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret words “Mocha Latte“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.
Complete the CYBER.ORG – Networking and Cybersecurity 1-2H Final Exam Spring 2023 assessment provided in today’s Google Classroom assignment postby the end of the class period today.
This is an open-resource exam, and you may use any and all CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class, as well as the https://apps.cyber.org/ Kali Linux virtual environment as your resources. You may not use any printed materials.
You may not use other students as resources. Please remain silent until the end of the testing session.
The exam contains one hundred multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
You have forty-five minutes to complete the test. You must submit your test answers before the end of the class period at 2:01pm.
Click the Google Classroom link and log in with your Haydenmagnet.org email address.
You will find a Class Announcement titled “Networking and Cyberecurity 1-2H Final Exam Study Guide“. Attached, you will find a copy of the Final Exam that you may use to review.
The Final Exam will take place on Friday, May 19th.
This will be an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
You may not, however, collaborate with your classmates; You will be asked to please remain silent until everyone has completed the exam.
The exam contains one hundred multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
Be advised that you will only have forty-five minutes to complete the test, so looking up each answer individually would be inadvisable. You must submit your test answers before the end of the class period at 2:01pm.
Study, be prepared, and do your best on Friday’s Final Exam!
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentations: 1.3.5 – Buffer Overflows and Race Conditions.pptx, and Lab – Buffer Overflow.pptx
Assignment:
Begin by reading the 1.3.5 – Buffer Overflows and Race Conditions.pptx presentation.
Read and complete the lab activity in the Lab – Buffer Overflow.pptx document.
To confirm completion the lab activity, upload two screenshots: One demonstrating the meterpreter session in Kali sending the keyboard commands to the compromised Windows system, and a second screenshot demonstrating the “we have taken over your system” message in Wordpad in the compromised Windows environment with today’s date to today’s Google Classroom post.
Please do your best to complete this Lab by the end of the class period on Friday.
The Final Exam is currently being generated. Details on the topics and domains covered by the comprehensive final will be provided on Monday, to allow time for review and preparation for the Final Exam, which will be delivered on Friday, May 19th.
Assigned: May 10th, 2023 Teacher Pacing Due Date: May 12th, 2023
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentations: 1.3.9 – API and Resource Exhaustion Attacks.pptx, and Lab – RAT Removal.pptx
Assignment:
Begin by reading the 1.3.9 – API and Resource Exhaustion Attacks.pptx presentation.
Read and complete the lab activity in the Lab – RAT Removal.pptx document.
To confirm completion the lab activity, upload two screenshots: one “before” that shows the location of the RATs on the Windows hard drive, and one “after” showing all the RAT’s folders and scripts successfully deleted to today’s Google Classroom post.
Please do your best to complete this Lab by the end of the class period on Tuesday.
Assigned: May 8th, 2023 Teacher Pacing Due Date: May 9th, 2023
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentations: 1.2.10 – Rootkits.pptx, and Lab – RAT/Bot.pptx
Assignment:
Begin by reading the 1.2.10 – Rootkits.pptx presentation.
Read and complete the lab activity in the Lab – RAT/Bot.pptx document.
To confirm completion the lab activity, upload a screenshot with today’s date from within the Kali machine demonstrating the active RAT connection and the open meterpreter session to today’s Google Classroom post.
Please do your best to complete this Lab by the end of the class period on Wednesday.
Assigned: May 2nd, 2023 Teacher Pacing Due Date: May 3rd, 2023