Tag Archives: Spring 2023

Network+,  Lesson 6.2: Dynamic Host Configuration Protocol – TestOut

Exam Objectives Covered: 

  • 1.4 Explain common networking ports, protocols, services, and traffic types. 
  • 3.4 Given a scenario, implement IPv4 and IPv6 network services.  

Links:

Overview:

Every host interface needs an IP configuration to communicate on a TCP/IP network. An administrator can manually assign these IP addresses, or the assignment can be done automatically. By understanding the different methods available to you for assigning IP addresses, you can choose the method that best suits different networks and hosts.

Text Lessons:

  • 6.2.3 DHCP Options
  • 6.2.4 DHCP Reservations and Exclusions 

Text and Video Lessons:

  • 6.2.1 DHCP Process (1:45 minutes) 
  • 6.2.2 DHCP Server Configuration (15:49 minutes) 
  • 6.2.9 Configure Client Addressing Demo (2:22 minutes) 

Lab/Activity:

  • 6.2.5 Lab: Configure a DHCP Server 
  • 6.2.6 Lab: Configure DHCP Server Options 
  • 6.2.7 Lab: Create DHCP Exclusions 
  • 6.2.8 Lab: Create DHCP Client Reservations
  • 6.2.10 Lab: Configure Client Addressing for DHCP 

Quiz/Assessment:

  • 6.2.11 Lesson Review (10 questions) 

Topics Discussed:

  • What is a DHCP scope? 
  • What type of configuration parameters can be delivered using DHCP? 
  • What type of devices can be used as a DHCP server? 
  • What are the advantages and disadvantages of static and reserved IP address assignments? 

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Lesson 6.2: Dynamic Host Configuration Protocol and complete the 6.2.5 Lab: Configure a DHCP Server,  6.2.6 Lab: Configure DHCP Server Options, 6.2.7 Lab: Create DHCP Exclusions, 6.2.8 Lab: Create DHCP Client Reservations, 6.2.10 Lab: Configure Client Addressing for DHCP, and the 10 question 6.2.11 Lesson Review Exam to complete the Section.

Assigned: April 21st, 2025
Teacher Pacing Due Date: April 23rd, 2025

NETWORKING AND CYBERSECURITY 1-2H: FINAL EXAM SPRING 2023

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lessons, Case Studies and Labs presented in class
  • https://apps.cyber.org/ CYBER.ORG Cyber Range virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Cybersecurity 1-2H Final Exam Spring 2023 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is an open-resource exam, and you may use any and all CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class, as well as the https://apps.cyber.org/ Kali Linux virtual environment as your resources. You may not use any printed materials.
  • You may not use other students as resources. Please remain silent until the end of the testing session.
  • The exam contains one hundred multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  • You have forty-five minutes to complete the test. You must submit your test answers before the end of the class period at 2:01pm.
  • Good luck, and do your best!

Posted: May 19th, 2023

NETWORKING AND CYBERSECURITY 2H: FINAL EXAM SPRING 2023 REVIEW

Objective:

  • I can demonstrate my understanding of CyberSecurity Principles through a summative exam.

Links:

Google Classroom: https://classroom.google.com/

Topics Discussed:

  • Linux
  • CyberSecurity Law
  • Security Basics
  • Actors and Vulnerabilities
  • Malware and Attacks

Assignment:

  1. Click the Google Classroom link and log in with your Haydenmagnet.org email address.
  2. You will find a Class Announcement titled “Networking and Cyberecurity 1-2H Final Exam Study Guide“. Attached, you will find a copy of the Final Exam that you may use to review.
  3. The Final Exam will take place on Friday, May 19th.
  4. This will be an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  5. You may not, however, collaborate with your classmates; You will be asked to please remain silent until everyone has completed the exam.
  6. The exam contains one hundred multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  7. Be advised that you will only have forty-five minutes to complete the test, so looking up each answer individually would be inadvisable. You must submit your test answers before the end of the class period at 2:01pm.
  8. Study, be prepared, and do your best on Friday’s Final Exam!

Posted: May 16th, 2023

CYBER.ORG – 1.3.5 – Buffer Overflows and Race Conditions & Lab – Buffer Overflow

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: 1.3.5 – Buffer Overflows and Race Conditions.pptx, and Lab – Buffer Overflow.pptx

Assignment:

  1. Begin by reading the 1.3.5 – Buffer Overflows and Race Conditions.pptx presentation.
  2. Read and complete the lab activity in the Lab – Buffer Overflow.pptx document.
  3. To confirm completion the lab activity, upload two screenshots: One demonstrating the meterpreter session in Kali sending the keyboard commands to the compromised Windows system, and a second screenshot demonstrating the “we have taken over your system” message in Wordpad in the compromised Windows environment with today’s date to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Friday.
  5. The Final Exam is currently being generated. Details on the topics and domains covered by the comprehensive final will be provided on Monday, to allow time for review and preparation for the Final Exam, which will be delivered on Friday, May 19th.

Assigned: May 10th, 2023
Teacher Pacing Due Date: May 12th, 2023

CYBER.ORG – 1.3.9 – API and Resource Exhaustion Attacks & Lab – RAT Removal

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: 1.3.9 – API and Resource Exhaustion Attacks.pptx, and Lab – RAT Removal.pptx

Assignment:

  1. Begin by reading the 1.3.9 – API and Resource Exhaustion Attacks.pptx presentation.
  2. Read and complete the lab activity in the Lab – RAT Removal.pptx document.
  3. To confirm completion the lab activity, upload two screenshots: one “before” that shows the location of the RATs on the Windows hard drive, and one “after” showing all the RAT’s folders and scripts successfully deleted to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Tuesday.

Assigned: May 8th, 2023
Teacher Pacing Due Date: May 9th, 2023

CYBER.ORG – 1.2.6 – Bots and Botnets & Case Study – Botnet

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentation: 1.2.6 – Bots and Botnets.pptx
  • See PDF Document: Case Study – Botnet

Assignment:

  1. Begin reading the 1.2.6 – Bots and Botnets.pptx presentation.
  2. Read the Case Study – Botnet.pdf document and be prepared to answer the questions at the end.
  3. Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Tuesday.

Assigned: April 24th, 2023
Teacher Pacing Due Date: April 25th, 2023

CYBER.ORG – 1.3.7 – Replay Attacks and Pass the Hash & Lab – Pass the Hash

Objective: Given a scenario, the student will analyze potential
indicators associated with application attacks.

Resources:

  • See PowerPoint presentations: 1.3.7 – Replay Attacks and Pass the Hash.pptx, and Lab – Pass the Hash.pptx

Assignment:

  1. Begin by reading the 1.3.7 – Replay Attacks and Pass the Hash.pptx presentation.
  2. Read and complete the lab activity in the Lab – Pass the Hash.pptx document.
  3. To confirm completion the lab activity, upload a screenshot with today’s date showing the results of the getuid and sysinfo commands demonstrating that you have Administrator-level access in the Windows 7 environment to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: April 18th, 2023
Teacher Pacing Due Date: April 19th, 2023

CYBER.ORG – 1.3.1 – Privilege Escalation & Lab – Privilege Escalation

Objective: Given a scenario, the student will analyze potential
indicators associated with application attacks.

Resources:

  • See PowerPoint presentations: 1.3.1 – Privilege Escalation.pptx, and Lab – Privilege Escalation.pptx

Assignment:

  1. Begin by reading the 1.3.1 – Privilege Escalation.pptx presentation.
  2. Read and complete the lab activity in the Lab – Privilege Escalation.pptx document.
  3. To confirm completion the lab activity, upload a screenshot of the Meterpreter session with the escalated privileges that demonstrates that you have Administrator-level access to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: April 12th, 2023
Teacher Pacing Due Date: April 12th, 2023

CYBER.ORG – Lab – Keylogger Application

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: Lab – Keylogger Application.pptx

Assignment:

  1. Read and complete the lab activity in the Lab – Keylogger Application.pptx document.
  2. This lab is similar to the Intro to Keyloggers lab we did last week, but it uses a different, non-Java based application to harvest keystrokes.
  3. To do this, you will need to activate a backdoor session. Follow the steps at the end of the Powerpoint document to quickly establish a backdoor session on the vulnerable Windows 7 machine, then proceed with the steps to locate and shut down the active backdoor session using the available tools within Windows.
  4. To confirm completion the lab activity, activate the keylogger, then visit https://netop.mistermarmolejo.com in the Vulnerable Windows 7 environment while the keylogger is active. Upload a screenshot of the Meterpreter session showing the captured keystrokes of your visit to the Netop website to today’s Google Classroom post.
  5. Please do your best to complete this Lab by the end of the class period today.

Assigned: April 10th, 2023
Teacher Pacing Due Date: April 11th, 2023

CYBER.ORG – Lab – Backdoor Removal

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: Lab – Backdoor Removal.pptx

Assignment:

  1. Read and complete the lab activity in the Lab – Backdoor Removal.pptx document.
  2. This lab will walk you through the process of locating and removing an active backdoor session.
  3. To do this, you will need to activate a backdoor session. Follow the steps at the end of the Powerpoint document to quickly establish a backdoor session on the vulnerable Windows 7 machine, then proceed with the steps to locate and shut down the active backdoor session using the available tools within Windows.
  4. To confirm completion the lab activity, upload a screenshot of both the active Meterpreter Attack session that shows the backdoor session in action, and the TimeoutError messages demonstrating that the attack has been terminated to today’s Google Classroom post.
  5. Please do your best to complete this Lab by the end of the class period on Friday.

Assigned: April 5th, 2023
Teacher Pacing Due Date: April 6th, 2023