Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.
Resources:
See PowerPoint presentation: 2.2.1 – Software Security Tools
Assignment:
Begin reading the 2.2.1 – Software Security Tools presentation. This lesson includes an overview on software tools that are widely used in cybersecurity.
Review last week’s presentations to prepare for the Command Line Security Tools quiz tomorrow.
Begin reading the Lab – ip-ifconfig.pptx, Lab – TCPDump.pptx, Lab – Traceroute.pptx. These lessons will provide practice with three very useful command line tools used in cybersecurity.
Follow the instructions in each of the Lab presentations.
The TCPDump lab will produce a file that you will need to upload to today’s assignment post in our Google Classroom.
The Traceroute lab will ask questions that you will be required to answer in a form posted in the Google Classroom.
These labs are self paced, but do your best to complete them by the end of the day on Friday, February 19th.
Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.
Resources:
See PowerPoint presentation: 2.2.2 – Command Line Security Tools
Assignment:
Begin reading the 2.2.2 – Command Line Security Tools presentation. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
Download the Linux Commands Cheat Sheet.pdf file to use as a quick resource for the useful Linux commands and tools that we have studied thus far.
Assigned: February 16th, 2021 Teacher Pacing Due Date: February 17th, 2021