Tag Archives: CYBER.ORG

CYBER.ORG – LAB – LINUX 102

Objective:

Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.

Topics Discussed:

options/flags
df
Superuser
sudo
processes
Searching
grep
uname
chown/chmod
top
syslog
logger

Resources:

  • See PowerPoint presentations: Lab – Linux 102

Assignment:

  1. Read the Lab – Linux 102 to review advanced Linux commands within the Linux operating system.
  2. Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentation, and practice or test the commands as you read about them.
  3. The Lab – Linux 102 presentation will introduce advanced options and flags, searching for text strings using find and grep, changing file ownership and permissions, and gaining “super user” privileges with the sudo command, among other topics.
  4. We will work on this Lab today and tomorrow, and will conclude with a final Linux activity on Wednesday that will be due on Friday.
  5. As proof of completion of the Linux 102 Lab, upload a screenshot of the custom log commands you created on the syslog (On Your Own) slide, as verified by displaying the last 10 lines of the syslog (demonstrated in the presentation).

Assigned: September 22nd, 2025
Teacher Pacing Due Date: September 24th, 2025

CYBER.ORG: AP Cybersecurity – Topic 1.2C – Managing Risk

Objective:

  • Students will be able to explain how organizations can be more cyber resilient.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.CS.LOSS- Develop a plan for risk mitigation that implements redundancy.
  • CSTA Compatibility Standards
    • 3A-DA-10: Evaluate the tradeoffs in how data elements are organized and where data is stored.

    Guiding Question:

    How can organizations prepare for and recover from cyber incidents to protect their core purpose?

    Resources:

    • Lesson PPT Cybersecurity 1.2.C.pptx Presentation and Lab 1.2.C – Remote Backups.pptx available on Google Classroom

    Assignment:

    1. Read through the Lesson PPT Cybersecurity 1.2.C.pptx presentation in today’s class.
    2. Complete the Lab 1.2.C – Remote Backups using the materials provided.

    Assigned: September 10th, 2025
    Teacher Pacing Due Date: September 12th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 1.2.1 – CIA Triad and AAA

    Objective:

    • Students will be able to summarize authentication and authorization design concepts.

    Standards:

    • CompTIA Security+ SYO-701 Objective:
      • 1.2 – Summarize fundamental security concepts

    Guiding Question:

    How do the principles of the CIA Triad interact with authentication, authorization, and accounting framework to ensure the overall security of information systems?

    Resources:

    • Lesson 1.2.1 – CIA Triad and AAA.pptx Presentation available on Google Classroom

    Assignment:

    1. Read through the Lesson 1.2.1 – CIA Triad and AAA.pptx presentation in today’s class.
    2. Complete the in-class Activity using the materials provided.

    Assigned: September 9th, 2025
    Teacher Pacing Due Date: September 9th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 5.4.1 – Security Compliance

    Objective:

    • Students will investigate the elements of effective security compliance..

    Standards:

    CompTIA Security+ SYO-701 Objective:
    5.4 – Summarize elements of effective security compliance

    Guiding Question:

    What are the elements of effective security compliance?

    Resources:

    • Lesson 5.4.1 – Security Compliance.pptx Presentation available on Google Classroom

    Assignment:

    1. Read through the Lesson 5.4.1 – Security Compliance.pptx presentation in today’s class.
    2. Complete the in-class Activity in class using the materials provided.

    Assigned: September 2nd, 2025
    Teacher Pacing Due Date: September 3rd, 2025

    CYBER.ORG: AP Cybersecurity – Topic 5.2.1 – Risk Management

    Objective:

    • Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.

    Standards:

    CompTIA Security+ SYO-701 Objective:
    5.2 – Explain elements of the risk management process

    Guiding Question:

    What are the factors used when calculating risk and how do you assign a value to risk?

    Resources:

    Assignment:

    1. Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
    2. Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.

    Assigned: August 29th, 2025
    Teacher Pacing Due Date: August 29th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 2.2.2 – OSINT

    Objective:

    • Students will investigate open source-online tools (OSINT) used to perform reconnaissance.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 6-8.DC.FOOT.1 -Recognize the many sources of data that make up a digital footprint
    • CSTA Compatibility Standards
      • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

    Guiding Question:

    How and why is open-source intelligence used legally to gather free, public information?

    Resources:

    Assignment:

    1. Follow along with the 2.2.2 – OSINT.pptx presentation in today’s class.
    2. Complete the OSINT Report on Tony Stark Activity in class using the materials provided in Google Classroom.

    Assigned: August 28th, 2025
    Teacher Pacing Due Date: August 29th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 2.1.1 – Social Engineering

    Objective:

    • Define the steps used in typical digital attacks.
    • Define social engineering as the human risk in organization security.
    • Identify techniques for social engineering and how to mitigate against these techniques.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
    • CSTA Compatibility Standards
      • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

    Guiding Question:

    How can we protect against social engineering?

    Resources:

    Assignment:

    1. Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
    2. Complete the Seven Steps of Hacking Activity in class using the materials provided.

    Assigned: August 27th, 2025
    Teacher Pacing Due Date: August 27th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 1.1.A – Threat Actors & Case Study – Stuxnet

    Objective:

    The student will analyze threat actors and their motivations.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 2.1 – Compare and contrast common threat actors and motivations

    Guiding Question:

    What are threat actors and their motivations?

    Resources:

    Assignment:

    1. Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
    2. Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
    3. Please do your best to complete the Case Study by end of day on Tuesday, August 26th.

    Assigned: August 25th, 2025
    Teacher Pacing Due Date: August 26th, 2025

    CYBER.ORG – WELCOME TO THE CYBER RANGE – FALL 2025

    Objective:

    Students will begin preparing for proficiency in cyber security by connecting to the CYBER.ORG Cyber Range.

    Link:

    Assignment:

    1. Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
    2. A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
    3. Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
    4. Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
    5. We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface on Monday.

    Posted: August 14th, 2025

    Networking Fundamentals – Lab Activity – Local Area Network Configuration 2024

    Objectives:

    • Given a scenario, the student will be able to configure and deploy workstations in a local area network configuration using the appropriate networking standards and technologies.

    Resources:

    • Refer to prior PowerPoint presentations on Network Topologies, Network Types, Connector Types, Cable Management, Protocols, Networking Devices and Networked Devices for review.

    Topics Discussed:

    • The Internet and World Wide Web
    • Networking Fundamentals
    • Local Area Network
    • Network Topologies
    • Hubs vs Switches
    • TCP/IP – Transport Connect Protocol/Internet Protocol
    • Cable Management

    Assignment:

    1. Today we will be working on a lab activity, where we will organize and assemble a local area network to function in a working classroom.
    2. Four laptops, three routers, an unmanaged switch and all of the necessary cables and peripherals have been provided. Students should also take note of the collection of network cables, as they will be called upon to select one of an appropriate length when it is time to assemble the network.
    3. Refer to the in-class discussion on Network Hardware and Network Topologies – which would be the best physical topology for the proposed class configuration, given the networking equipment we have on hand?
    4. As a class, decide on the best arrangement for the equipment, given the room’s existing network infrastructure and the technical and physical requirements of our class, as well as OSHA regulations and best practices.
    5. With these requirements in mind, assemble the network according to the instructor’s directions.
    6. Is the networking device you are using a router or a switch? How can you tell the difference? Can you tell just by looking at the device?
    7. What type of cable are we using? Why are we using this type of cable? Why are we even using cable instead of connecting the workstations to the Wi-Fi network? What are the benefits of wired networking over wireless?
    8. As the network takes shape, can you see why the topology selected was the best to suit the classroom conditions?
    9. Participation points will be awarded for participating in the lab rebuild. You must be in attendance and participate each day of the lab to receive credit, so don’t miss class and don’t miss out on some easy lab points!

    Assigned: November 6th, 2024
    Teacher Pacing Due Date: November 7th, 2024