Category Archives: Networking and Operating Systems

Networking and Operating Systems Assignments and Information

CYBER.ORG – Lab – Passwords

Objective:

Given a scenario, implement identity and account management controls.

Resources:

  • See PowerPoint presentation: Lab – Passwords

Assignment:

  1. Read the Lab – Passwords presentation.
  2. Use your Kali Linux console at https://apps.cyber.org to follow along with the presentation and learn how to exploit the hashed passwords in Linux to gain access to a targeted user’s account.
  3. Continue through to the “On Your Own Activity”, and create the three different password types below. Take screenshots of the plaintext results of the mkpasswd command to confirm that each was completed:
    1. Your own SHA-512 password with a different salt than the one used in the example
    2. A different password using MD5 algorithm
    3. Another password using SHA-256 algorithm
  4. Make sure your passwords work!
  5. Upload all three screenshots to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: November 9th, 2022
Teacher Pacing Due Date: November 9th, 2022

CYBER.ORG – 2.8.1 – Hashing and Digital Signatures & 2.8.2 – Elliptic Curves and Perfect Forward Secrecy

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentations: 2.8.1 – Hashing and Digital Signatures.pptx, 2.8.2 – Elliptic Curves and Perfect Forward Secrecy.pptx

Assignment:

  1. Read the 2.8.1 – Hashing and Digital Signatures.pptx presentation. This lesson will introduce you to Cryptography, Hashing and Digital Signatures and their importance in data encryption and validation.
  2. Next, read the 2.8.2 – Elliptic Curves and Perfect Forward Secrecy.pptx presentation. This lesson will introduce you to advanced encryption methodologies.
  3. Please read through both of these by the end of the day on Tuesday, November 8th to prepare for the Passwords lab on Wednesday, November 9th.

Assigned: November 8th, 2022
Teacher Pacing Due Date: November 9th, 2022

CYBER.ORG – 4.5.1 – Digital Forensics Evidence, 4.5.2 – Digital Forensics Evidence Acquisition & CASE STUDY

Objective:

Explain the key aspects of digital forensics.

Resources:

  • See PowerPoint presentations: 4.5.1 – Digital Forensics Evidence.pptx, 4.5.2 – Digital Forensics Evidence Acquisition

Assignment:

  1. Begin reading the 4.5.1 – Digital Forensics Evidence.pptx presentation. This lesson will introduce you to the concept of Digital Forensics.
  2. Next, read the 4.5.2 – Digital Forensics Evidence Acquisition.pptx presentation. This lesson will introduce you to the procedures involved in collecting Digital Forensics Evidence.
  3. Finally, read the Case Study – Digital Evidence Acquisition document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Tuesday, November 8th.

Assigned: November 7th, 2022
Teacher Pacing Due Date: November 8th, 2022

CYBER.ORG – 4.4.1 Post-Incident Mitigation Techniques

Objective:

Given an incident, apply mitigation techniques or
controls to secure an environment.

Resources:

  • See PowerPoint presentation: 4.4.1 Post-Incident Mitigation Techniques.pptx

Assignment:

  1. Begin reading the 4.4.1 Post-Incident Mitigation Techniques.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.

Posted: November 4th, 2022

CYBER.ORG – 4.2.1 Incident Response Process & Case Study

Objective:

Summarize the importance of policies, processes, and
procedures for incident response.

Resources:

  • See PowerPoint presentation: 4.2.1 Incident Response Process.pptx

Assignment:

  1. Begin reading the 4.2.1 Incident Response Process.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.
  2. Next, read the Case Study – Incident Response document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the day on Friday, November 4th.

Assigned: November 2nd, 2022
Teacher Pacing Due Date: November 4th, 2022

CYBER.ORG – 4.3.1 – Log Files Types, 4.3.2 – Types of Logs, 4.3.3 – Metadata & Metadata Lab

Objective:

Given an incident, utilize appropriate data sources to
support an investigation.

Resources:

  • See PowerPoint presentations: 4.3.1 Log Files Types.pptx, 4.3.2 – Types of Logs.pptx, 4.3.3 – Metadata.pptx, Lab – Juice Shop Setup & Lab – Metadata.pptx

Assignment:

  1. Begin reading the three lesson presentations. These lessons will introduce you to data sources that are required to support an investigation following a Cybersecurity-related incident.
  2. Next, read and follow the instructions in the Lab – Juice Shop Setup.pptx presentation. You will need to complete these steps first before you attempt the next Lab.
  3. Once you have completed the Juice Shop Setup, read and follow the instructions in the Lab – Metadata.pptx Lab presentation.
  4. To complete this lab, take a screenshot of the screen confirming that you are logged into the Juice Shop as John and post this screenshot to today’s Assignment post in the Google Classroom.
  5. This lab is self paced, but do your best to complete it by the end of the day on Wednesday, November 2nd.

Assigned: October 31st, 2022
Teacher Pacing Due Date: November 2nd, 2022

CYBER.ORG – 4.1.8 – Data Sanitization & 2.7.2 – Data Destruction

Objective: Given a scenario, carry out data security and privacy practices.

Resources:

  • See PowerPoint presentations: 4.1.8 – Data Sanitization; 2.7.2 – Data Destruction

Assignment:

  1. Begin reading the 4.1.8 – Data Sanitization and the 5.8.1 – Data Destruction.pptx presentation.
  2. Use the CYBER.ORG Cyber Range to complete the lab in the Lab – Data Sanitization.pptx presentation.
  3. Read the Case Study – Data Destruction document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.

Assigned: October 19th, 2022
Teacher Pacing Due Date: October 21st, 2022

1st Quarter Reflection – Fall 2022

Objective:

  • I can reflect on my involvement and engagement with the lessons I have learned during the 1st Quarter of Fall 2022 by answering a series of reflective questions so that I can identify my areas of strength and opportunities for growth.

Vocabulary Words:

  • Reflection
  • Linux Basics

Links:
https://classroom.google.com

Topics Discussed:

  • Reflection
  • Linux Basics

Assignment:

  1. Connect to the Google Classroom site and click on the link to the Google Form at the bottom of the latest post.
  2. Think back from the beginning of the school year to now, and answer the questions provided to reflect on your successes and struggles throughout the first quarter.
  3. You must have at least two complete sentences for each question in each prompt, but use as many sentences as you need to complete your short answer.
  4. Once you have answered all the questions, continue to the next section until the Submit button appears. Click the Submit button at the bottom of the page to submit your final responses. Do not click any other buttons or navigate away from the page before submitting your answers, or they may be erased. You may even wish to type your answers in a Google Doc or Word Document and then transfer them to the form.
  5. Once you have submitted your form, return to the Google Classroom assignment post, and click the Mark as Done button to mark this assignment as completed and ready for grading.
  6. Your response will be graded on the following criteria: meeting minimum length requirements, clarity, original ideas and mechanics (spelling, grammar and punctuation).
  7. You should consider this a professional post-mortem of a long-form academic project, and conduct yourself accordingly.
  8. Good luck, and thanks for all your hard work in the first quarter! Enjoy your Fall Break, and I’ll see you on the 17th when we’ll get started with advanced network security tools within the Linux environment!

Assigned: October 7th, 2022
Teacher Pacing Due Date: October 7th, 2022

CYBER.ORG – 4.1.4 – Packet Capture and Replay Tools + TCPDump Lab + Wireshark Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx

Assignment:

  1. Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
  2. Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
  3. When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Wednesday, October 5th.

Assigned: October 3rd, 2022
Teacher Pacing Due Date: October 5th, 2022

CYBER.ORG 4.1.1 & 4.1.3 – Shell and Script Environments and Network Reconnaissance and Discovery

Objective: Given a scenario, the student will use the appropriate
tool to assess organizational security.

Resources:

  • See PowerPoint presentation: 4.1.1 – Network Reconnaissance and Discovery Tools and 4.1.3 – Shell and Script Environments

Assignment:

  1. Download and read the 4.1.3. – Shell and Script Environments presentation to learn about the different interfaces available within Linux.
  2. Next, download and read the 4.1.1 – Network Reconnaissance and Discovery Tools presentation to get details about the many network discovery tools available within Kali Linux. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
  3. We will be using the information in these presentations in a series of labs that will be issued next week.

Assigned: September 28th, 2022
Teacher Pacing Due Date: September 30th, 2022