Connect to our Google Classroom and navigate to today’s assignment post titled: CYBER.ORG – Linux Quiz – Fall 2022.
The quiz contains 40 questions, half short-response and half multiple-choice. For the short-response questions, please type the correct answer into the space provided. For the multiple-choice questions, please select the best answer from the options provided.
This is an open-resource quiz, and you may use the Linux 101 – 104 slideshows presented in class, as well as the https://linuxjourney.com website as your resources.
Submit your test answers before the end of the class period today. The test is due at the end of the class period, so please manage your time wisely.
Assigned: September 20th, 2022 Due Date: September 20th, 2022
Compare and contrast different types of social engineering techniques.
Resources:
See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf
Assignment:
Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.
Assigned: December 7th, 2021 Teacher Pacing Due Date: December 9th, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptx, Lab – Phishing.pptx
Assignment:
Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: December 2nd, 2021 Teacher Pacing Due Date: December 6th, 2021
See PowerPoint presentation: 2.8.7 – Common Cryptography Use Cases.pptx
Assignment:
Read the 2.8.7 – Common Cryptography Use Cases.pptx presentation. This lesson will introduce you to how and why cryptography is commonly used, and why it is so important.
Please read through the presentation by the end of the day on Monday, November 22nd.
Assigned: November 22nd, 2021 Teacher Pacing Due Date: November 22nd, 2021
Objective: Compare and contrast basic cryptography concepts.
Resources:
See PowerPoint presentation: Lab – Steganography
Assignment:
Begin reading and complete the lab in the Lab – Steganography.pptx presentation.
Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post.
Please include the message/password along with your image so Mister can test it! We will use these images in Thursday’s class session. (So keep your messages classy!)
On Thursday, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
A Google Form will be provided to answer the Case Study questions Thursday afternoon. This will be the last assignment of this three-week grading period.
Assigned: November 16th, 2021 Teacher Pacing Due Date: November 18th, 2021