Tag Archives: Linux

Cyber Security Boot Camp – Day 2: The Linux CLI

Objective:  Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.
Links:
Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
Assignment:
  1. Load  the Linux Journey website, and navigate to the Command Line instruction module.
  2. Today we will walk through the Command Line online instruction module together, investigating a number of important commands used to navigate and perform actions within the Linux shell.
  3. Visit JSLinux to see a fully-featured Linux shell running a JavaScript-based emulator. This also provides us a very useful platform for practicing CLI commands.
  4. Input the commands described in the module, and observe their output:
    1. echo
    2. pwd
    3. cd
    4. ls
    5. touch
    6. file
    7. cat
    8. less
    9. history
    10. cp
    11. mv
    12. mkdir
    13. rm
    14. find
    15. help
    16. man
    17. whatis
    18. alias
    19. exit
  5. Once you’ve got the hang of these basics, we’ll explore more complex commands in tomorrow’s module.
Assigned: January 8th, 2019
Teacher Pacing Due Date: January 9th, 2019

Cyber Security Boot Camp – Day 1: Beginning the Linux Journey

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux
Assignment:
  1. Visit the Arizona Cyber Warfare Range website. The AZCWR is a live fire cyber warfare range created to further the development of cyber security and information security skills for those who wish to develop such skills. Our goal this semester is to become proficient enough to tackle the challenges presented by the Cyber Warfare Range.
  2. Take a look at the Learning Resources page on the AZCWR website. These are the resources recommended by the AZCWR to gain the skills needed to take on the range, and these will form the backbone of our training this semester.
  3. The first step is to gain proficiency in Linux, as by its own admission, close to 100% of everything the AZCWR (and by extension, a large portion of systems that run the Internet) is done in Linux.
  4. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  5. Tomorrow, we will begin working with the Command Line Interface in Linux, and investigate a few important commands.
Assigned: January 7th, 2019
Teacher Pacing Due Date: January 8th, 2019

Cyber Warfare Boot Camp – Week 7: Wireshark Packet Analysis

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration
Assignment:
  1. Today we are going to start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
  2. Watch Hansang Bee’s Intro and About the Wireshark Environment video to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
  3. We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.
Assigned: February 28th, 2018
Teacher Pacing Due Date: March 2nd, 2018

Cyber Warfare Boot Camp – Week 5: Network Config in the Linux CLI

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Network Config” item.
  2. Network Configuration is how you set up your network. In Windows, much of this is done for you by the OS. Linux will do this for you if you want it to, but if you want to get hands-on with the interfaces and routing options, then there are many tools within the CLI that will let you do so.
  3. Read through the module to discover how to view and manipulate network interfaces, routing tables, DHCP leases, ARP caches and view network settings using the Network Manager tool.
  4. Don’t forget to get signed out for Advisory tomorrow to participate in the AZ Cyber Warfare Range hacking activity with David Hernandez! It’s going to be a 90 minute activity, so you’ll want to get started during Advisory to participate in the whole thing!
Assigned: February 14th, 2018
Teacher Pacing Due Date: February 15th, 2018

Cyber Warfare Boot Camp – Week 3: Webminal and VIM Tutor

Objective: 

Students will continue preparing for proficiency in cyber security by completing a tutorial on the VIM Text Editor application within the Linux Command Line Interface.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
  • VIM text editor
Assignment:
  1. Visit Webminal.org, and log in using the account that you created last week.
  2. By now you should have completed lessons 1 through 5, and should have a basic understanding of how to navigate, create and manipulate files and directories, and manipulate system processes within the Linux CLI.
  3. This week, we are going to further investigate the manipulation of text files within the Linux CLI by using the first of two very popular text editors built into Linux: VIM
  4. Log into Webminal.org and type “vimtutor” at the command prompt.
  5. Complete the VIM Tutorial. There are seven lessons in the tutorial, and upon completion, you should have a basic understanding of how to create, edit and save files, as well as get additional help in VIM.
  6. You should be able to complete all seven lessons by the end of this week. Pace yourself accordingly.
Assigned: January 22nd, 2018
Teacher Pacing Due Date: January 26th, 2018

Cyber Warfare Boot Camp – Day 4: Webminal Continued

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
Assignment:
  1. Visit Webminal.org, and used the account you created yesterday to log in.
  2. Take a look at the tutorials available in the left column. We will begin with Lesson 1 today and work our way through the tutorials this week and next week learning the basics of the Linux command line interface.
Assigned: January 11th, 2018
Teacher Pacing Due Date: January 19th, 2018

Cyber Warfare Boot Camp – Day 3: Webminal

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
Assignment:
  1. Visit Webminal.org, and create an account using your haydenmagnet.org email address.
  2. Continue exploring the Linux command line, using the command descriptions and tutorials available on the Webminal site.
Assigned: January 10th, 2018
Teacher Pacing Due Date: January 10th, 2018

Cyber Warfare Boot Camp – Day 2: The Linux CLI

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
Assignment:
  1. Load  the Linux Journey website, and navigate to the Command Line instruction module.
  2. Today we will walk through the Command Line online instruction module together, investigating a number of important commands used to navigate and perform actions within the Linux shell.
  3. Visit JSLinux to see a fully-featured Linux shell running a JavaScript-based emulator. This also provides us a very useful platform for practicing CLI commands.
  4. Input the commands described in the module, and observe their output:
    1. echo
    2. pwd
    3. cd
    4. ls
    5. touch
    6. file
    7. cat
    8. less
    9. history
    10. cp
    11. mv
    12. mkdir
    13. rm
    14. find
    15. help
    16. man
    17. whatis
    18. alias
    19. exit
  5. Once you’ve got the hang of these basics, we’ll explore more complex commands in tomorrow’s module.
Assigned: January 9th, 2018
Teacher Pacing Due Date: January 10th, 2018

Cyber Warfare Boot Camp – Day 1: Beginning the Linux Journey

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux
Assignment:
  1. Visit the Arizona Cyber Warfare Range website. The AZCWR is a live fire cyber warfare range created to further the development of cyber security and information security skills for those who wish to develop such skills. Our goal this semester is to become proficient enough to tackle the challenges presented by the Cyber Warfare Range.
  2. Take a look at the Learning Resources page on the AZCWR website. These are the resources recommended by the AZCWR to gain the skills needed to take on the range, and these will form the backbone of our training this semester.
  3. The first step is to gain proficiency in Linux, as by its own admission, close to 100% of everything the AZCWR (and by extension, a large portion of systems that run the Internet) is done in Linux.
  4. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  5. Tomorrow, we will begin working with the Command Line Interface in Linux, and investigate a few important commands.
Assigned: January 8th, 2018
Teacher Pacing Due Date: January 9th, 2018