Objective: Given a scenario, the student will use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentation: 4.1.1 – Network Reconnaissance and Discovery Tools.pptx
Assignment:
Download and read the 4.1.1 – Network Reconnaissance and Discovery Tools presentation to get details about the many network discovery tools available within Kali Linux. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
Next, read and follow the instructions in both of the Lab presentations. We will have plenty time to work on these labs in today’s class meeting.
When you have completed both the labs, answer the questions in the Assignment form posted in the Google Classroom.
These labs are self paced, but do your best to complete them by the end of the day on Friday, September 8th.
Assigned: September 6th, 2023 Teacher Pacing Due Date: September 8th, 2023
Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.
Topics Discussed:
APT Repository apt-cache apt-get redirection (with “|” pipe) CTRL + C (break) options/flags cat nano tar archive chmod perl
Resources:
PowerPoint presentation: Lab – Fun With Linux
PDF document: Linux Commands Cheat Sheet.pdf
Assignment:
Begin reading the Lab – Fun With Linux presentation to have a little fun while practicing with commands in the Linux operating system.
This lab will introduce you to the APT Repository, an open source collection of apps, games and utilities that can be downloaded and used in Linux for free.
Notice that the games and utilities that you will encounter in today’s lab use many of the commands and techniques that we have been studying over the past week!
To complete today’s Lab activity, upload a screenshot of your ASCII aquarium to today’s Google Classroom assignment post!
Assigned: August 30th, 2023 Teacher Pacing Due Date: September 1st, 2023
Read the Lab – Linux 102 to review advanced Linux commands within the Linux operating system.
Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentation, and practice or test the commands as you read about them.
The Lab – Linux 102 presentation will introduce advanced options and flags, searching for text strings using find and grep, changing file ownership and permissions, and gaining “super user” privileges with the sudo command, among other topics.
We will work on this Lab today and tomorrow, and will conclude with a final Linux activity on Wednesday that will be due on Friday.
As proof of completion of the Linux 102 Lab, upload a screenshot of the custom log commands you created on the syslog (On Your Own) slide, as verified by displaying the last 10 lines of the syslog (demonstrated in the presentation).
Assigned: August 28th, 2023 Teacher Pacing Due Date: August 29th, 2023
Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.
Resources:
See PowerPoint presentations: Lab – Linux 101
Assignment:
Read the Lab – Linux 101 to review fundamental Linux commands within the Linux operating system.
Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentations, and practice or test the commands as you read about them.
Begin reading the Lab – Linux 101 presentation to study the fundamentals of the Linux operating system. I will show you how to do some of the steps (Watch) and we will do some of the steps together (Together). Then, you will need to follow the steps listed on each “On Your Own” slide, being careful not to skip any steps.
To demonstrate completion of this assignment, upload two screenshots: The first of the Terminal window from slide 24 that shows the results of the rm -rf command, and the second of the Terminal window displaying the results of the -v option when used with both of the directory commands introduced on slide 36 of the Lab presentation.
Assigned: August 22nd, 2023 Teacher Pacing Due Date: August 25th, 2023
Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface this Tuesday, following the I-Day scheduled on Monday.
Assigned: August 18th, 2023 Teacher Pacing Due Date: August 18th, 2023
I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.
Open a Chrome browser and visit the Google website.
Click the blue Sign In button in the upper right corner.
Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
Click on the blue New button on the left hand side, and create a new Google Doc.
In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past week and a half together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc. Add a couple more sentences about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
I can effectively navigate the Macintosh OS, and change my desktop wallpaper, mouse settings and desktop settings using the System Preferences so I can customize and configure my Mac workspace to suit my preferences.
Links:
None
Topics Discussed:
Mac OSX Ventura
Desktop
Menu Bar
System Preferences
Mouse
Dock
Icons
Finder
Trash
Launchpad
Documents
Finder Window
Finder Window Views
Safari
Google Image Search
Resolution
Assignment:
Today we’ll begin our introduction to the Macintosh operating system.
Follow along with the in-class demonstrations to learn how to:
Log in using your newly created account.
Change your password, if you wish to do so.
Navigate through the OSX Ventura operating system.
Activate and use the virtual assistant, Siri.
Identify and use items on the desktop, including the Finder, application icons, the menu bar, the dock, the trash and the Launchpad.
Use the System Preferences panel to adjust your Desktop wallpaper and your Mouse settings (enable right click).
Open a new Finder window and navigate to your Documents folder to store files and folders.
Use the Finder window to view files and folders in different ways.
Adjust the Finder Preferences to see all items on the desktop.
Use Safari to browse the web
Locate and bookmark the class website (https://netop.mistermarmolejo.com).
Use Google Image Search to find an appropriate image to personalize your desktop. (Keep it classy!)
Use the Search Tools underneath the search bar to search for Large images with higher resolutions for the best results.
Remember: for the image to look good on your desktop, it has to have a minimum horizontal resolution of 1920 pixels!
Today I’ll walk you through the process of logging in to the computer for the first time.
Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you get logged in today so you’re ready for this week’s lessons.
I can agree to abide by the class policies by reviewing the established policies and procedures to help ensure the classroom is a safe and fun place for everyone.
Links:
None.
Topics Discussed:
Classroom Policies and Procedures
Computer Acceptable Use Policy
Assignment:
Welcome back! Today we’re going to go over the class rules, or as I like to call them, the Policies and Procedures.
Society’s based on policies and procedures. Without ’em, we’re no better than poo-flinging monkeys in the jungle. Humans agree to abide by laws so we can all get along and get things accomplished with a minimum of screaming, head-bashing and poo-flinging.
The policies and procedures are pretty straightforward, and they’re all posted in the front of the room where you can see them at all times. They’re all really based on one simple thing: respect.
I’m going to show you respect at all times in the classroom, and all I ask is that you return the favor.
I also ask that you treat everyone else with respect, so that they can do the same for you.
The chairs have wheels for a reason: if you need to scoot over to collaborate with a partner, that’s great. Don’t use them to scoot all over the room, and don’t get up and wander aimlessly. Move with purpose.
Have respect for other people who are trying to get work done, and don’t bother them. Don’t steal anybody’s work (or stuff, for that matter).
Treat my stuff and the school’s stuff with respect, so that it can stay in good shape for you and for everyone else. Let me know right away if anything is marked, damaged or missing so I can address it immediately.
We’re going to have a lot of opportunities to critique the work of others in this class. Keep it respectful, positive and constructive, please. Don’t feel bad if someone else critiques your work, it’s only going to help you improve and get stronger.
I’ve got a lot of cool stuff to teach you in this class. Please don’t make it any harder for me than it already is by disrupting my class, or making it harder for the people around you to pay attention.
I promise not to come to your room and mess it up; can you do me the same courtesy? I’d appreciate it.
Don’t leave the room without my permission. I need to know where you are at all times. If you need to leave the room, please sign out on the digital sign-out sheet provided.
Read your Student Handbook! We all (you and me both) are required to abide by its policies, so it’s important to know exactly what those policies are so you don’t violate them unintentionally (Or intentionally!).
Do any of the class policies seem strange? Like something you shouldn’t have to be asked not to do? Guess what: the reason that policy’s in place is because some knucklehead decided to be a creep and had to be told to stop. Please: Don’t be that guy.
If you can agree to abide by these policies and procedures, then we can all get along. If there’s anything you feel like you can’t agree to here, let me know and we can talk it over.
I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Networking and CyberSecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for Networking and CyberSecurity 1-2H! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.