Tag Archives: Linux

CYBER.ORG – Lab – Linux 102

Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.

Resources:

  • See PowerPoint presentation: Lab – Linux 102

Assignment:

  1. Begin reading the Lab – Linux 102 presentation to study the fundamentals of the Linux operating system.

Assigned: February 5th, 2021
Teacher Pacing Due Date: February 8th, 2021

CYBER.ORG – Lab – Linux 101

Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.

Resources:

  • See PowerPoint presentation: Lab – Linux 101

Assignment:

  1. Begin reading the Lab – Linux 101 presentation to study the fundamentals of the Linux operating system.

Assigned: February 2nd, 2021
Teacher Pacing Due Date: February 5th, 2021

CYBER.ORG – Intro to Linux

Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.

Resources:

  • See PowerPoint presentation: Appendix A – Linux

Assignment:

  1. Begin reading the Appendix A – Linux presentation to study the fundamentals of the Linux operating system.

Assigned: February 1st, 2021
Teacher Pacing Due Date: February 5th, 2021

Cyber Security Boot Camp – Day 2: The Linux CLI – Spring 2021

Objective:  Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output

Assignment:

  1. Load  the Linux Journey website, and navigate to the Command Line instruction module.
  2. Today we will walk through the Command Line online instruction module together, investigating a number of important commands used to navigate and perform actions within the Linux shell.
  3. Visit JSLinux to see a fully-featured Linux shell running a JavaScript-based emulator. This also provides us a very useful platform for practicing CLI commands.
  4. Input the commands described in the module, and observe their output:
    1. echo
    2. pwd
    3. cd
    4. ls
    5. touch
    6. file
    7. cat
    8. less
    9. history
    10. cp
    11. mv
    12. mkdir
    13. rm
    14. find
    15. help
    16. man
    17. whatis
    18. alias
    19. exit
  5. Once you’ve got the hang of these basics, we’ll explore more complex commands in tomorrow’s module. Be prepared to use these commands in a brief Check for Understanding quiz on Friday.

Assigned: January 14th, 2021
Teacher Pacing Due Date: January 15th, 2021

Cyber Security Boot Camp – Day 1: Beginning the Linux Journey – Spring 2021

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies by learning the basics of the Linux operating system.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux

Assignment:

  1. The first step on our journey to Cybersecurity proficiency is to gain proficiency in the Linux operating system. A large portion of the systems that run the Internet run on a variant of Linux, and therefore learning how to effectively use the Linux command line will be a necessary step towards gaining this proficiency.
  2. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  3. Tomorrow, we will begin working with the Command Line Interface in Linux, and investigate a few important commands.

Assigned: January 12th, 2021
Teacher Pacing Due Date: January 13th, 2021

Cyber Security Boot Camp – Wireshark Packet Analysis Activity

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration

Assignment:

  1. Capture packets on your eth0 interface for a period of five minutes. Visit https://netop.mistermarmolejo.com to get some http traffic going during the packet capture.
  2. Save the packet capture as a .pcapng file with today’s date, and upload it to today’s assignment post on Google Classroom to complete the activity by end of day tomorrow.
  3. If you are not sure how to begin a packet capture on the eth0 interface, review Professor Messer’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial.
  4. If your Kali Linux Virtualbox installation is still not working, see Mister Marmolejo for assistance.

Assigned: March 7th, 2019
Teacher Pacing Due Date: March 8th, 2019

Cyber Warfare Boot Camp – Period 7 – Wireshark Packet Analysis

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration

Assignment:

  1. Today we will start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
  2. Watch Professor Messer’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
  3. We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.

Assigned: March 5th, 2019
Teacher Pacing Due Date: March 6th, 2019

Cyber Warfare Boot Camp – Week 4: Subnetting

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Subnetting
  • Subnet Mask
  • Octet
  • Host
  • IP Address Classes

Assignment:

  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Subnetting” item.
  2. Subnetting is one of those things that you do with a calculator in the real world, but you’re not going to be allowed to take a calculator with you if you take a test like the Network+, CySA+ or CCNA exams, so you better learn how to do it on your own.
  3. The “Subnetting” section of the Linux Journey website gives you a quick explanation of what subnetting is, and how it works. It also provides a subnet math cheat method that should get you through most of the problems you’ll encounter. However, if you want a more thorough understanding of how it works (and trust me, you do) visit the Subnetting.net link for further details.
  4. The “How to Subnet” page at Subnetting.net provides a thorough overview of what subnetting is and how it works. If you’re too lazy to read the page (and I know most of you are) you can watch the Subnetting Tutorial video series, and get a full explanation of what subnetting is, how it works, and how to figure out subnets without the need for a calculator.
  5. Once you understand the patterns of how “borrowing bits” for the subnet mask works, take a look at Professor Messer’s Seven Second Subnetting video. In it, he explains a very effective method of quickly determining the number of subnets, the addresses of the created subnets, the broadcast address, and the first and last usable address from a given IP address and subnet mask presented in CIDR notation.
  6.  With the materials provided here, you should be able to achieve a strong foundation in subnetting, which will allow you to handle a good portion of the questions on the CCNA and Network+ certification exams, as well as have a strong understanding of how packets figure out how to travel from one host to another, even when they’re on very different networks.

Assigned: January 31st, 2019
Teacher Pacing Due Date: February 1st, 2019

Cyber Warfare Boot Camp – Week 4: Network Basics

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Application Layer
  • Transport Layer
  • Network Layer
  • Link Layer
  • DHCP Overview

Assignment:

  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Network Basics” item. This week we will focus on Networking fundamentals.
  2. Read up on the Network Basics and the OSI model. Much of this will be review from our previous experience in the lab, but we will use this week to go into further detail as to how the different parts of the OSI model work together, and how each part of the process functions to allow machines to communicate with each other.
  3.  On Thursday, we will get into subnetting, which is a way of dividing networks up into smaller groups by address.

Assigned: January 28th, 2019
Teacher Pacing Due Date: February 1st, 2019

Cyber Warfare Boot Camp – Week 3: Webminal and VIM Tutor

Objective: 

Students will continue preparing for proficiency in cyber security by completing a tutorial on the VIM Text Editor application within the Linux Command Line Interface.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
  • VIM text editor

Assignment:

  1. Visit Webminal.org, and log in using the account that you created last week.
  2. By now you should have completed lessons 1 through 5, and should have a basic understanding of how to navigate, create and manipulate files and directories, and manipulate system processes within the Linux CLI.
  3. This week, we are going to further investigate the manipulation of text files within the Linux CLI by using the first of two very popular text editors built into Linux: VIM
  4. Log into Webminal.org and type “vimtutor” at the command prompt.
  5. Complete the VIM Tutorial. There are seven lessons in the tutorial, and upon completion, you should have a basic understanding of how to create, edit and save files, as well as get additional help in VIM.
  6. You should be able to complete the seven lessons by the end of this week. Pace yourself accordingly.

Assigned: January 22nd, 2019
Teacher Pacing Due Date: January 25th, 2019