Category Archives: Networking and Operating Systems

Networking and Operating Systems Assignments and Information

Welcome to the National Cyber League! – Week 1: Gym Training

Objective: 

Students will begin preparing for competition in the National Cyber League by familiarizing themselves with the competition rules and procedures through training in the NCL Gym.

Links:

Topics Discussed:

  • Cyber Security
  • National Cyber League
  • NCL Spring Season
  • Preseason
  • Regular Season
  • Postseason

Assignment:

  1. The NCL Gym is now open! The NCL Gym provides practice challenges to help prepare players for Preseason, Regular Season and Postseason. We will begin practicing in the NCL Gym when our accounts become available.
  2. While practicing in the NCL Gym, access the solutions guide to receive step-by-step instructions to help you understand the more difficult challenges.
  3. Log into the Gym
  4. Read the FAQ – you need to know the NCL lingo
  5. Mark your calendars with the following important NCL Preseason and Regular season dates:
    1. 1/31 – 5/27: Gym Training
    2. 3/28 – 4/4: Preseason Practice Game
    3. 4/8 – 4/10: Regular Season Individual Game
    4. 4/22 – 4/24: Postseason Team Game

The First Game: Preseason Practice Play
The Preseason Practice is a week-long game that measures individual performance and prepares students for the Regular Season game. Participation in the Preseason is recommended to help new players prepare and returning players refresh for the Individual and Team Games. The Preseason Practice gameplay starts at 10:00 a.m. MST on Monday, March 28th and ends at 6:00 p.m. MST on Monday, April 4th.

There are lots of preparatory materials available. Also, be sure to check out the Player Resources, as well as the Rules of Conduct.

Assigned: Feb 8th, 2022
Teacher Pacing Due Date: March 25th, 2022

Welcome to CyberStart America!

Objective: 

Students will begin preparing for competition in the National Cyber League by participating in CyberStart America, an immersive cybersecurity training game for high school students.

Links:

Topics Discussed:

  • Cyber Security
  • CyberStart America

Assignment:

  1. Welcome back! I hope your holidays were happy and restful! We are going to switch gears as we work towards competition in the National Cyber League and/or Security + Certification at the end of the month.
  2. In the interest of providing you with more hands-on experience with cybersecurity concepts, I am pleased to introduce CyberStart America, an immersive cybersecurity training game for high school students, where you will take the role of an agent with the “Cyber Protection Agency” and solve challenging puzzles based on real-world situations that you might face as a cybersecurity professional.
  3. Visit the CyberStart America website and register for a free account using your haydenmagnet.org email address. You will need to access your haydenmagnet.org Gmail, as the website sends several confirmation emails in sequence. Be sure to keep your Gmail open until you receive the third confirmation email that allows you to set a password before you proceed with the challenges.
  4. Start with the Intern Base to get a feel for what it’s like to work in cybersecurity. You may work at your own pace, and even work from home if you choose to do so. Remember that these challenges start easy and get harder as you progress, so don’t skip forward too far!
  5. Are you completely confused by any particular challenge? Consult the Field Manual! Click the “Field Manual” link in the upper left corner of the website to view background info on the concepts presented in the challenges, and even watch walkthrough videos (Chapter 07) if you’re completely stumped.
  6. You may work at your own pace, and use any resources that you have available to you to complete the challenges (even other students!)
  7. Do you want to work together with a partner or squad up with a group? Click on the “Groups” link at the top of the page, and click “Create Group” to get a group code that you can share with your crew to squad up and tackle the challenges as a team!
  8. Make sure you join my “NetOp P6” group so I can track your progress, as well. See me for the Join code if you haven’t joined already.
  9. We will continue working with CyberStart America for the next three weeks. At the end of the three weeks, I will buy lunch for the individual or team with the highest point total. Grind solo and get all the food for yourself, or choose your teammates wisely and have a victory feast with your friends!
  10. Good luck, and have fun with the challenges! Bear in mind that the National Cyber League competition will begin at the end of the month. Those who are not studying for Security + certification will begin practicing in the NCL Gym when our accounts become available.

Assigned: January 4th, 2022
Teacher Pacing Due Date: January 21st, 2022

NETWORKING AND OPERATING SYSTEMS 1H Midterm EXAM – Fall 2021

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class
  • https://us.cyberrange.org Kali Linux virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Operating Systems 1H Midterm Exam Fall 2021 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is a closed-resource exam. Please put away all study and reference materials, and please do not open any other tabs besides this one until you have submitted the quiz.
  • Please remain silent throughout the duration of the testing session.
  • While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely..

Assigned: December 14th, 2021
Teacher Pacing Due Date: December 14th, 2021

CYBER.ORG – 1.1.3 – Dumpster Diving & 1.1.4 – Shoulder Surfing, & Case Study – Dumpster Diving

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf

Assignment:

  1. Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
  2. Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
  3. Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.

Assigned: December 7th, 2021
Teacher Pacing Due Date: December 9th, 2021

CYBER.ORG – 1.1.2 – Phishing and Spam & Phishing LAB

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptxLab – Phishing.pptx

Assignment:

  • Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
  • Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
  • Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: December 2nd, 2021
Teacher Pacing Due Date: December 6th, 2021

CYBER.ORG – 1.1.8 Credential Harvesting & Credential Harvesting Lab

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.8 Credential Harvesting.pptxLab – Credential Harvesting

Assignment:

  • Begin reading the 1.1.8 Credential Harvesting.pptx presentation. This lesson will introduce you to social engineering-based attacks designed to acquire login credentials from victims.
  • Next, begin the Lab – Credential Harvesting.pptx lab.Use the Social Engineering Toolkit to launch a phishing attack.
  • Play the victim, and upload a screenshot of the successful attack screen with the “GOT A HIT!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: November 30th, 2021
Teacher Pacing Due Date: December 2nd, 2021

CYBER.ORG – 1.1.1 – Principles of Social Engineering

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

  • See PowerPoint presentation: 1.1.1 – Principles of Social Engineering.pptx

Assignment:

  1. Read the 1.1.1 – Principles of Social Engineering.pptx presentation. This lesson will introduce you to Social Engineering and how it is used to manipulate people into doing things that they ordinarily would not do.
  2. Please read through the presentation by the end of the day on Monday, November 29th.

Assigned: November 29th, 2021
Teacher Pacing Due Date: November 29th, 2021

CYBER.ORG – 2.8.7 – Common Cryptography Use Cases

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentation: 2.8.7 – Common Cryptography Use Cases.pptx

Assignment:

  1. Read the 2.8.7 – Common Cryptography Use Cases.pptx presentation. This lesson will introduce you to how and why cryptography is commonly used, and why it is so important.
  2. Please read through the presentation by the end of the day on Monday, November 22nd.

Assigned: November 22nd, 2021
Teacher Pacing Due Date: November 22nd, 2021

CYBER.ORG – 2.8.6 – Steganography CASE STUDY

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PDF Document: Case Study – Steganography.pdf

Assignment:

  1. Begin reading the Case Study – Steganography.pdf document and be prepared to answer the questions at the end.
  2. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  3. Please do your best to complete this Case Study by the end of the day today, Thursday, November 13th.
  4. Check your Synergy to ensure that you have received credit for all assignments that you have turned in before tomorrow’s three-week grade report.

Assigned: November 13th, 2021
Teacher Pacing Due Date: November 13th, 2021

CYBER.ORG – LAB – STEGANOGRAPHY

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: Lab – Steganography

Assignment:

  1. Begin reading and complete the lab in the Lab – Steganography.pptx presentation.
  2. Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post.
  3. Please include the message/password along with your image so Mister can test it! We will use these images in Thursday’s class session. (So keep your messages classy!)
  4. On Thursday, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
  5. A Google Form will be provided to answer the Case Study questions Thursday afternoon. This will be the last assignment of this three-week grading period.

Assigned: November 16th, 2021
Teacher Pacing Due Date: November 18th, 2021