Tag Archives: Cyber Security

CYBER.ORG – LAB – Dictionary Attack

Objective:

Given a scenario, analyze potential indicators to determine the type of attack.

Given a scenario, use the appropriate tool to assess organizational security.

Resources:

  • See PowerPoint presentation: Lab – Dictionary Attack.pptx

Assignment:

  1. Read the Lab – Dictionary Attack.pptx presentation.
  2. Use your Kali Linux console at https://uscyberrange.org to follow along with the presentation and learn how to use Dictionary Attacks to crack passwords.
  3. Continue through to the “Launch the Attack” slide. Take a screenshot of the cracked passwords as a result of the Dictionary attack.
  4. Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: November 1st, 2021
Teacher Pacing Due Date: November 3rd, 2021

CYBER.ORG – LAB – Rainbow Table

Objective:

Given a scenario, analyze potential indicators to determine the type of attack.

Given a scenario, use the appropriate tool to assess organizational security.

Resources:

  • See PowerPoint presentation: Lab – Rainbow Table.pptx

Assignment:

  1. Read the Lab – Rainbow Table.pptx presentation.
  2. Use your Kali Linux console at https://uscyberrange.org to follow along with the presentation and learn how to use Rainbow Tables to crack passwords.
  3. Continue through to the “Observe the Results” slide. Take a screenshot of the solved passwords as a result of the Rainbow Table attack.
  4. Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: October 28th, 2021
Teacher Pacing Due Date: October 28th, 2021

CYBER.ORG – 1.2.11 – Password Attacks & 4.17 – Password Cracking Tools; Brute Force – Offline Lab

Objectives:

Given a scenario, analyze potential indicators to
determine the type of attack.

Given a scenario, use the appropriate tool to assess
organizational security

Resources:

  • See PowerPoint presentations: 1.2.11 Password Attacks.pptx, 4.1.7 Password Cracking Tools, Lab – Brute Force – Offline

Assignment:

  1. Begin reading the 1.2.11 Password Attacks.pptx presentation. This lesson will introduce you to different types of password attacks.
  2. Next, read the 4.1.7 Password Cracking Tools presentation. This lesson will introduce you to readily accessible tools used to crack passwords.
  3. Next, begin the Lab – Brute Force – Offline.pptx lab.
  4. Use what you learned in today’s lab to crack the hashes downloaded from github, and post a screenshot of the cracked hashes to today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Tuesday, October 26th. We will start a new lab featuring additional password cracking techniques on Thursday.

Assigned: October 26th, 2021
Teacher Pacing Due Date: October 28th, 2021

CYBER.ORG – 4.3.1 – Log Files Types, 4.3.2 – Types of Logs, 4.3.3 – Metadata & Metadata Lab

Objective:

Given an incident, utilize appropriate data sources to
support an investigation.

Resources:

  • See PowerPoint presentations: 4.3.1 Log Files Types.pptx, 4.3.2 – Types of Logs.pptx, 4.3.3 – Metadata.pptx, Lab – Juice Shop Setup & Lab – Metadata.pptx

Assignment:

  1. Begin reading the three lesson presentations. These lessons will introduce you to data sources that are required to support an investigation following a Cybersecurity-related incident.
  2. Next, read and follow the instructions in the Lab – Juice Shop Setup.pptx presentation. You will need to complete these steps first before you attempt the next Lab.
  3. Once you have completed the Juice Shop Setup, read and follow the instructions in the Lab – Metadata.pptx Lab presentation.
  4. To complete this lab, take a screenshot of the screen confirming that you are logged into the Juice Shop as John and post this screenshot to today’s Assignment form posted in the Google Classroom.
  5. This will be the final lab and the final assignment grade of the first term. This lab is self paced, but do your best to complete it by the end of the day on Thursday, September 30th.

Assigned: September 28th, 2021
Teacher Pacing Due Date: September 30th, 2021

CYBER.ORG – 4.1.5 – Forensic Tools + Autopsy LAB

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.5 Forensic Tools.pptx, Lab – Autopsy.pptx

Assignment:

  1. Begin reading the 4.1.5 Forensic Tools.pptx presentation. This lesson will introduce you to several digital forensics tools including the Autopsy app, a powerful tool for hard drive data analysis.
  2. Next, read and follow the instructions in the Lab – Autopsy.pptx Lab presentations. We will also have time to work on this lab in tomorrow’s class meeting.
  3. When you have completed the lab and found the images, take a screenshot of the View Notes screen showing the notes you left following the image downloads that you completed, and post this screenshot to today’s Assignment form posted in the Google Classroom.
  4. This lab is self paced, but do your best to complete it by the end of the day on Tuesday, September 28th.

Assigned: September 27th, 2021
Teacher Pacing Due Date: September 28th, 2021

CYBER.ORG – 4.1.8 – DATA Sanitization tools & 2.7.2 – Data DESTRUCTION

Objective: Given a scenario, carry out data security and privacy practices.

Resources:

  • See PowerPoint presentations: 4.1.8 – Data Sanitization; 2.7.2 – Data Destruction

Assignment:

  1. Begin reading the 4.1.8 – Data Sanitization and the 5.8.1 – Data Destruction.pptx presentation.
  2. Complete the lab in the Lab – Data Sanitization.pptx presentation.
  3. Read the Case Study – Data Destruction document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.

Assigned: September 23rd, 2021
Teacher Pacing Due Date: September 27th, 2021

CYBER.ORG – 4.1.4 – Packet Capture and Replay Tools + TCPDump Lab + Wireshark Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx

Assignment:

  1. Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
  2. Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
  3. When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Tuesday, September 21st.

Assigned: September 20th, 2021
Teacher Pacing Due Date: September 21st, 2021

CYBER.ORG: CYBER LAW CASE STUDY AND QUIZ

Objective: Students will begin preparing for proficiency in cyber security with an overview of relevant domestic and international laws so they can conduct cybersecurity operations within the boundaries of domestic and international law.

Resources:

  • Read the PowerPoint presentation: Appendix C – Federal Laws.pptx
  • Cyber Law Quiz

Assignment:

  1. Visit the Google Classroom page to download and read the Cyber Laws.pptx presentation to learn about the domestic and international laws related to cybersecurity that we will discuss in class today.
  2. Download and read the Case Study – Cyber Law.pdf document. We will be completing a Case Study activity to collect our thoughts on the issues raised by the incident discussed in the article.
  3. The class will conclude with a brief Check for Understanding quiz to confirm your understanding of the laws and regulations that pertain to the cyber security profession.

Assigned: August 31st, 2021
Teacher Pacing Due Date: September 2nd, 2021

CYBER SECURITY BOOT CAMP – DAY 1: BEGINNING THE LINUX JOURNEY – SPRING 2021

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies by learning the basics of the Linux operating system.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux

Assignment:

  1. The first step on our journey to Cybersecurity proficiency is to gain proficiency in the Linux operating system. A large portion of the systems that run the Internet run on a variant of Linux, and therefore learning how to effectively use the Linux command line will be a necessary step towards gaining this proficiency.
  2. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  3. Tomorrow, we will begin working with the Command Line Interface in Linux, and investigate a few important commands.

Assigned: August 12th, 2021
Teacher Pacing Due Date: August 13th, 2021

CYBER SECURITY BOOT CAMP – THE LINUX CLI – FALL 2021

Objective:  Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output

Assignment:

  1. Load  the Linux Journey website, and navigate to the Command Line instruction module.
  2. Let’s walk through the Command Line online instruction module together, investigating a number of important commands used to navigate and perform actions within the Linux shell.
  3. Visit JSLinux to see a fully-featured Linux shell running a JavaScript-based emulator. This also provides us a very useful platform for practicing CLI commands.
  4. Input the commands described in the module, and observe their output:
    1. echo
    2. pwd
    3. cd
    4. ls
    5. touch
    6. file
    7. cat
    8. less
    9. history
    10. cp
    11. mv
    12. mkdir
    13. rm
    14. find
    15. help
    16. man
    17. whatis
    18. alias
    19. exit
  5. Once you’ve got the hang of these basics, we’ll explore more complex commands in tomorrow’s module. Be prepared to use these commands in a brief Check for Understanding quiz next week.

Assigned: August 12th, 2021
Teacher Pacing Due Date: August 13th, 2021