Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptx, Lab – Phishing.pptx
Assignment:
Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: December 9th, 2022 Teacher Pacing Due Date: December 12th, 2022
See PowerPoint presentation: 2.8.7 – Common Cryptography Use Cases.pptx
Assignment:
Read the 2.8.7 – Common Cryptography Use Cases.pptx presentation. This lesson will introduce you to how and why cryptography is commonly used, and why it is so important.
Please read through the presentation by the end of the day on Tuesday, December 6th.
Assigned: December 6th, 2022 Teacher Pacing Due Date: December 6th, 2022
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentation: 1.1.1 – Principles of Social Engineering.pptx
Assignment:
Read the 1.1.1 – Principles of Social Engineering.pptx presentation. This lesson will introduce you to Social Engineering and how it is used to manipulate people into doing things that they ordinarily would not do.
Please read through the presentation by the end of the day on Tuesday, December 6th.
Assigned: December 6th, 2022 Teacher Pacing Due Date: December 6th, 2022
See PowerPoint presentations: 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption
Assignment:
Read the 2.8.5 – Block Ciphers and Lightweight Cryptography.pptx presentation. This lesson will introduce you to cryptographic methodologies and discuss their benefits and drawbacks.
Next, read the 2.8.6 – Steganography and Homomorphic Encryption.pptx presentation. This lesson will introduce you to the concept of Steganography, which we will be working with for the next couple of class meetings.
Please read through both of these by the end of the day on Wednesday, November 30th, then proceed to the Steganography Lab activity.
Assigned: November 30th, 2022 Teacher Pacing Due Date: November 30th, 2022
Objective: Compare and contrast basic cryptography concepts.
Resources:
See PowerPoint presentation: Lab – Steganography
Assignment:
Begin reading and complete the lab in the Lab – Steganography.pptx presentation.
Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post.
Please include the message/password along with your image so Mister can test it!
Assigned: November 30th, 2022 Teacher Pacing Due Date: December 2nd, 2022
See PowerPoint presentations: 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx, 2.8.4 Cryptography Modes of Operation and Blockchains.pptx
Assignment:
Read the 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx presentation. This lesson will introduce you to Quantum Cryptography, Ephemeral Keys and their importance in securing data.
Next, read the 2.8.4 Cryptography Modes of Operation and Blockchains.pptx presentation. This lesson will introduce you to Cryptography modes and the concept of a Blockchain.
Please read through both of these by the end of the day on Tuesday, November 29th.
Assigned: November 28th, 2022 Teacher Pacing Due Date: November 29th, 2022
Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentation: Lab – Brute Force Online.pptx
Assignment:
Read the Lab – Brute Force Online.pptx presentation.
Use your Kali Linux console at the CYBER.ORG Cyber Range to follow along with the presentation and learn how to use a combination of Brute Force and a Dictionary-style attack to crack an online service’s password.
Continue through to the “Log into DVWA” slide. Take a screenshot of the DVWA login landing screen demonstrating that you have successfully logged in using the stolen credentials.
Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.
Assigned: November 21st, 2022 Teacher Pacing Due Date: November 23rd, 2022
Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentation: Lab – Dictionary Attack.pptx
Assignment:
Read the Lab – Dictionary Attack.pptx presentation.
Use your Kali Linux console at the CYBER.ORG Cyber Range to follow along with the presentation and learn how to use Dictionary Attacks to crack passwords.
Continue through to the “Launch the Attack” slide. Take a screenshot of the cracked passwords as a result of the Dictionary attack.
Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.
Assigned: November 16th, 2022 Teacher Pacing Due Date: November 18th, 2022