Tag Archives: CYBER.ORG

CYBER.ORG – 1.7.1 – Threat Hunting, 1.7.2 – Vulnerability Scans, 1.7.3 – SIEM and SOAR, & Case Study – Bug Bounty

Objective:

The student will summarize the techniques used in
security assessments.

Resources:

  • See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf

Assignment:

  1. Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
  2. Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
  3. Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 7th, 2023
Teacher Pacing Due Date: March 8th, 2023

CYBER.ORG – 1.6.1 – Vulnerability Types, 1.6.2 – Vulnerability Impacts & Case Study – Zero Day Attack

Objective:

The student will explain the security concerns
associated with various types of vulnerabilities.

Resources:

  • See PowerPoint presentations 1.6.1 – Vulnerability Types.pptx,1.6.2 – Vulnerability Impacts.pptx and PDF document Case Study – Zero Day Attack.pdf

Assignment:

  1. Begin reading the 1.6.1 – Vulnerability Types.pptx and 1.6.2 – Vulnerability Impacts.pptx presentations.
  2. Familiarize yourself with some common types of network security vulnerabilities and their impacts.
  3. Read the Case Study – Zero Day Attack.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 6th, 2023
Teacher Pacing Due Date: March 7th, 2023

CYBER.ORG – 1.5.3 – Threat Intelligence Sources

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.3 – Threat Intelligence Sources.pptx

Assignment:

  1. Begin reading the 1.5.3 – Threat Intelligence Sources.pptx presentation.
  2. Familiarize yourself with some common threat intelligence and research sources.
  3. Please do your best to complete this reading assignment by the end of the class period today.

Assigned: March 3rd, 2023
Teacher Pacing Due Date: March 3rd, 2023

CYBER.ORG – 1.5.2 – Threat Vectors & Case Study – Stuxnet

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.2 – Threat Vectors.pptx and PDF document Case Study – Stuxnet 2023.pdf

Assignment:

  1. Begin reading the 1.5.2 – Threat Vectors.pptx presentation.
  2. Familiarize yourself with seven common threat vectors attackers can use to gain access to a network.
  3. Read the Case Study – Stuxnet 2023.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 1st, 2023
Teacher Pacing Due Date: March 3rd, 2023

CYBER.ORG – 1.5.1 – Threat Actors & Case Study – Insider Threat

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.1 – Threat Actors.pptx and PDF document Case Study – Insider Threat.pdf

Assignment:

  1. Begin reading the 1.5.1 – Threat Actors.pptx presentation.
  2. Familiarize yourself with some common threat actors and their motives.
  3. Read the Case Study – Insider Threat.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: February 27th, 2023
Teacher Pacing Due Date: February 28th, 2023

CYBER.ORG – 1.1.13 – Pretexting & 1.1.14 Case Study – IT Army of Ukraine

Objective:

The student will compare and contrast different types
of social engineering techniques.

Resources:

  • See PowerPoint presentation: 1.1.13 – Pretexting.pptx and PDF document Case Study – IT Army of Ukraine.pdf

Assignment:

  1. Begin reading the 1.1.13 – Pretexting.pptx presentation.
  2. Familiarize yourself with the pattern and practice of Pretexting, and defenses against this type of social engineering technique.
  3. Read the Case Study – IT Army of Ukraine.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period tomorrow.

Assigned: February 21st, 2023
Teacher Pacing Due Date: February 22nd, 2023

CYBER.ORG – 1.1.12 – Client Hijacking Attacks & Lab – Typosquatting

Objective:

Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentations: 1.1.12 – Client Hijacking Attacks and Lab – Typosquatting.pptx

Assignment:

  1. Begin reading the 1.1.12 – Client Hijacking Attacks.pptx presentation.
  2. Read and complete the lab activity in the Lab – Typosquatting.pptx document.
  3. To confirm completion the lab activity, post a screenshot of the downloaded MaliciousFile.exe from the Typosquatted website! Make sure you include the website in the image.
  4. Please do your best to complete this Lab by the end of the class period today.

Assigned: February 15th, 2023
Teacher Pacing Due Date: February 17th, 2023

CYBER.ORG – 1.1.11 – Watering Hole Attacks & Case Study – Watering Hole

Objective:

Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentation: 1.1.11 – Watering Hole Attacks.pptx and PDF Document Case Study – Watering Hole.pdf

Assignment:

  1. Begin reading the 1.1.11 Watering Hole Attacks.pptx presentation.
  2. Read the Case Study – Watering Hole.pdf document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the class period today.

Assigned: February 14th, 2023
Teacher Pacing Due Date: February 15th, 2023

NETWORKING AND CYBERSECURITY 1H MIDTERM EXAM – FALL 2022

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class
  • https://apps.cyber.org Kali Linux virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Cybersecurity 1H Midterm Exam Fall 2022 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  • You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  • The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  • You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.
  • While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely.

Assigned: December 21st, 2022
Teacher Pacing Due Date: December 21st, 2022

NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW

Objective:

  • I can demonstrate my understanding of CyberSecurity Principles through a summative exam.

Links:

Google Classroom: https://classroom.google.com/

Topics Discussed:

  • Linux
  • CyberSecurity Law
  • Security Basics
  • Actors and Vulnerabilities

Assignment:

  1. Click the Google Classroom link and log in with your Haydenmagnet.org email address.
  2. You will find a Class Announcement titled “NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW“. Attached, you will find a copy of the Final Exam that you may use to review for tomorrow’s test.
  3. This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  4. You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  5. The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  6. You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.

Posted: December 19th, 2022