Tag Archives: CYBER.ORG

CYBER.ORG: Networking Fundamentals – 1.2.1 – Network Topologies & 1.2.1 – Activity – Network Topologies with String

Objective:

Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.

Resources:

  • See PowerPoint presentation: 1.2.1 – Network Topologies.pptx

Assignment:

  1. Begin reading the 1.2.1 – Network Topologies.pptx presentation. This lesson will introduce you to the characteristics of network topologies and network types..
  2. Next, complete the 1.2.1 – Activity – Network Topologies with String activity in class today. Mister will provide the materials and explanation.
  3. Finally, complete the CYBER.ORG – Network Topologies Discussion Questions form posted in the Google Classroom. You may turn this in as a group, just make sure all your group members’ names are listed in the Names: line of the form.

Assigned: September 22nd, 2023
Teacher Pacing Due Date: September 22nd, 2023

CYBER.ORG: Networking Fundamentals – 1.1.2 – Encapsulation and Decapsulation + 1.1.2 – Lab – Encapsulation and Decapsulation with Wireshark

Objective:

Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.

Topics Discussed:

  • Data encapsulation and decapsulation within the OSI model context
  • Ethernet header
  • Internet Protocol (IP) header
  • Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) headers
  • TCP flags
  • Payload
  • Maximum transmission unit (MTU)

Resources:

  • See PowerPoint presentation: 1.1.2 – Encapsulation and Decapsulation.pptx

Assignment:

  1. Begin reading the 1.1.2 – Encapsulation and Decapsulation.pptx presentation. This lesson will introduce you to what encapsulation and decapsulation is, and how it works with the OSI model we studied yesterday.
  2. Next, complete the 1.1.2 – Lab – Encapsulation and Decapsulation with Wireshark.pptx Lab posted in the Google Classroom. We will review the concepts presented in the lab to help explain how packets are formed, transmitted, received and decoded.
  3. To complete this lab, ping a website of your choice while Wireshark is capturing packets, and filter the IP address that you pinged. Post a screenshot of the filtered search to today’s Assignment post in the Google Classroom.
  4. Please do your best to complete this activity by the end of the day on Wednesday, September 20th.

Assigned: September 20th, 2023
Teacher Pacing Due Date: September 22nd, 2023

CYBER.ORG: Networking Fundamentals – 1.1.1 OSI Model + 1.1.1 Activity – My OSI Mnemonic

Objective:

Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.

Resources:

  • See PowerPoint presentation: 1.1.1 – OSI Model.pptx

Assignment:

  1. Begin reading the 1.1.1 – OSI Model.pptx presentation. This lesson will introduce you to the Open Systems Interconnection (OSI) model, a tool to help you visualize how data moves in a network.
  2. Next, complete the 1.1.1 Activity – My IOS Mnemonic Assignment form posted in the Google Classroom.
  3. Please do your best to complete this activity by the end of the day on Wednesday, September 13th.

Assigned: September 19th, 2023
Teacher Pacing Due Date: September 21st, 2023

CYBER.ORG – 4.1.4 – Packet Capture and Replay Tools + TCPDump Lab + Wireshark Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx

Assignment:

  1. Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
  2. Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
  3. When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Wednesday, September 13th.

Assigned: September 11th, 2023
Teacher Pacing Due Date: September 13th, 2023

CYBER.ORG – 4.1.3 – Shell and Script Environments

Objective: Given a scenario, the student will use the appropriate
tool to assess organizational security.

Resources:

  • See PowerPoint presentation: 4.1.3 – Shell and Script Environments

Assignment:

  1. Download and read the 4.1.3. – Shell and Script Environments presentation to learn about what a shell is and what it does in Windows and Linux.
  2. We will be using the information in these presentations in a series of labs that will be issued later this week.

Assigned: September 5th, 2023
Teacher Pacing Due Date: September 6th, 2023

CYBER.ORG – Lab – Fun With Linux

Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.

Topics Discussed:

APT Repository
apt-cache
apt-get
redirection (with “|” pipe)
CTRL + C (break)
options/flags
cat
nano
tar archive
chmod
perl

Resources:

  • PowerPoint presentation: Lab – Fun With Linux
  • PDF document: Linux Commands Cheat Sheet.pdf

Assignment:

  1. Begin reading the Lab – Fun With Linux presentation to have a little fun while practicing with commands in the Linux operating system.
  2. This lab will introduce you to the APT Repository, an open source collection of apps, games and utilities that can be downloaded and used in Linux for free.
  3. Notice that the games and utilities that you will encounter in today’s lab use many of the commands and techniques that we have been studying over the past week!
  4. To complete today’s Lab activity, upload a screenshot of your ASCII aquarium to today’s Google Classroom assignment post!

Assigned: August 30th, 2023
Teacher Pacing Due Date: September 1st, 2023

CYBER.ORG – LAB – LINUX 102

Objective:

Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.

Topics Discussed:

options/flags
df
Superuser
sudo
processes
Searching
grep
uname
chown/chmod
top
syslog
logger

Resources:

  • See PowerPoint presentations: Lab – Linux 102

Assignment:

  1. Read the Lab – Linux 102 to review advanced Linux commands within the Linux operating system.
  2. Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentation, and practice or test the commands as you read about them.
  3. The Lab – Linux 102 presentation will introduce advanced options and flags, searching for text strings using find and grep, changing file ownership and permissions, and gaining “super user” privileges with the sudo command, among other topics.
  4. We will work on this Lab today and tomorrow, and will conclude with a final Linux activity on Wednesday that will be due on Friday.
  5. As proof of completion of the Linux 102 Lab, upload a screenshot of the custom log commands you created on the syslog (On Your Own) slide, as verified by displaying the last 10 lines of the syslog (demonstrated in the presentation).

Assigned: August 28th, 2023
Teacher Pacing Due Date: August 29th, 2023

CYBER.ORG – LAB – LINUX 101

Objective:

Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.

Resources:

  • See PowerPoint presentations: Lab – Linux 101

Assignment:

  1. Read the Lab – Linux 101 to review fundamental Linux commands within the Linux operating system.
  2. Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentations, and practice or test the commands as you read about them.
  3. Begin reading the Lab – Linux 101 presentation to study the fundamentals of the Linux operating system. I will show you how to do some of the steps (Watch) and we will do some of the steps together (Together). Then, you will need to follow the steps listed on each “On Your Own” slide, being careful not to skip any steps.
  4. To demonstrate completion of this assignment, upload two screenshots: The first of the Terminal window from slide 24 that shows the results of the rm -rf command, and the second of the Terminal window displaying the results of the -v option when used with both of the directory commands introduced on slide 36 of the Lab presentation.

Assigned: August 22nd, 2023
Teacher Pacing Due Date: August 25th, 2023

CYBER.ORG – WELCOME TO THE CYBER RANGE – FALL 2023

Objective:

Students will begin preparing for proficiency in cyber security by connecting to the CYBER.ORG Cyber Range.

Link:

Assignment:

  1. Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
  2. A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
  3. Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
  4. Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
  5. We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface this Tuesday, following the I-Day scheduled on Monday.

Assigned: August 18th, 2023
Teacher Pacing Due Date: August 18th, 2023

NETWORKING AND CYBERSECURITY 1-2H: FINAL EXAM SPRING 2023

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lessons, Case Studies and Labs presented in class
  • https://apps.cyber.org/ CYBER.ORG Cyber Range virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Cybersecurity 1-2H Final Exam Spring 2023 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is an open-resource exam, and you may use any and all CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class, as well as the https://apps.cyber.org/ Kali Linux virtual environment as your resources. You may not use any printed materials.
  • You may not use other students as resources. Please remain silent until the end of the testing session.
  • The exam contains one hundred multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  • You have forty-five minutes to complete the test. You must submit your test answers before the end of the class period at 2:01pm.
  • Good luck, and do your best!

Posted: May 19th, 2023