Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security
Resources:
See PowerPoint presentations: 1.2.11 Password Attacks.pptx, 4.1.7 Password Cracking Tools, Lab – Brute Force – Offline
Assignment:
Begin reading the 1.2.11 Password Attacks.pptx presentation. This lesson will introduce you to different types of password attacks.
Next, read the 4.1.7 Password Cracking Tools presentation. This lesson will introduce you to readily accessible tools used to crack passwords.
Next, begin the Lab – Brute Force – Offline.pptx lab.
Use what you learned in today’s lab to crack the hashes downloaded from github, and post a screenshot of the cracked hashes to today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Wednesday, November 16th. We will start a new lab featuring additional password cracking techniques on Thursday.
Assigned: November 14th, 2022 Teacher Pacing Due Date: November 16th, 2022
Complete the CYBER.ORG – Networking and Operating Systems 1H Midterm Exam Fall 2021 assessment provided in today’s Google Classroom assignment postby the end of the class period today.
This is a closed-resource exam. Please put away all study and reference materials, and please do not open any other tabs besides this one until you have submitted the quiz.
Please remain silent throughout the duration of the testing session.
While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely..
Assigned: December 14th, 2021 Teacher Pacing Due Date: December 14th, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf
Assignment:
Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.
Assigned: December 7th, 2021 Teacher Pacing Due Date: December 9th, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.8 Credential Harvesting.pptx, Lab – Credential Harvesting
Assignment:
Begin reading the 1.1.8 Credential Harvesting.pptx presentation. This lesson will introduce you to social engineering-based attacks designed to acquire login credentials from victims.
Next, begin the Lab – Credential Harvesting.pptx lab.Use the Social Engineering Toolkit to launch a phishing attack.
Play the victim, and upload a screenshot of the successful attack screen with the “GOT A HIT!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: November 30th, 2021 Teacher Pacing Due Date: December 2nd, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentation: 1.1.1 – Principles of Social Engineering.pptx
Assignment:
Read the 1.1.1 – Principles of Social Engineering.pptx presentation. This lesson will introduce you to Social Engineering and how it is used to manipulate people into doing things that they ordinarily would not do.
Please read through the presentation by the end of the day on Monday, November 29th.
Assigned: November 29th, 2021 Teacher Pacing Due Date: November 29th, 2021
See PowerPoint presentation: 2.8.7 – Common Cryptography Use Cases.pptx
Assignment:
Read the 2.8.7 – Common Cryptography Use Cases.pptx presentation. This lesson will introduce you to how and why cryptography is commonly used, and why it is so important.
Please read through the presentation by the end of the day on Monday, November 22nd.
Assigned: November 22nd, 2021 Teacher Pacing Due Date: November 22nd, 2021
Objective: Compare and contrast basic cryptography concepts.
Resources:
See PowerPoint presentation: Lab – Steganography
Assignment:
Begin reading and complete the lab in the Lab – Steganography.pptx presentation.
Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post.
Please include the message/password along with your image so Mister can test it! We will use these images in Thursday’s class session. (So keep your messages classy!)
On Thursday, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
A Google Form will be provided to answer the Case Study questions Thursday afternoon. This will be the last assignment of this three-week grading period.
Assigned: November 16th, 2021 Teacher Pacing Due Date: November 18th, 2021
See PowerPoint presentations: 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption
Assignment:
Read the 2.8.5 – Block Ciphers and Lightweight Cryptography.pptx presentation. This lesson will introduce you to cryptographic methodologies and discuss their benefits and drawbacks.
Next, read the 2.8.6 – Steganography and Homomorphic Encryption.pptx presentation. This lesson will introduce you to the concept of Steganography, which we will be working with for the next couple of class meetings.
Please read through both of these by the end of the day on Monday, November 15th, as we will be performing a Steganography Lab in class tomorrow.
Assigned: November 15th, 2021 Teacher Pacing Due Date: November 15th, 2021
See PowerPoint presentations: 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx, 2.8.4 Cryptography Modes of Operation and Blockchains.pptx
Assignment:
Read the 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx presentation. This lesson will introduce you to Quantum Cryptography, Ephemeral Keys and their importance in securing data.
Next, read the 2.8.4 Cryptography Modes of Operation and Blockchains.pptx presentation. This lesson will introduce you to Cryptography modes and the concept of a Blockchain.
Please read through both of these by the end of the day on Thursday, November 4th.
Assigned: November 4th, 2021 Teacher Pacing Due Date: November 4th, 2021