Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack, and use the appropriate tool to assess organizational security. .
Resources:
See PowerPoint presentations: 1.2.3 – Trojans, Backdoors, and RATs.pptx, 4.1.6 – Exploitation Frameworks.pptx, and Lab – Backdoor.pptx
Assignment:
Begin by reading the 1.2.3 – Trojans, Backdoors, and RATs.pptx and 4.1.6 – Exploitation Frameworks.pptx presentations.
Read and complete the lab activity in the Lab – Backdoor.pptx document.
To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
Please do your best to complete this Lab by the end of the class period on Wednesday.
Assigned: March 28th, 2023 Teacher Pacing Due Date: March 29th, 2023
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentations: 1.2.2 Ransomware and Crypto-Malware and Lab – Ransomware Attack.pptx
Assignment:
Begin reading the 1.2.2 Ransomware and Crypto-Malware.pptx presentation.
Read and complete the lab activity in the Lab – Ransomware Attack.pptx document.
To confirm completion the lab activity, upload a screenshot of the activated Ransomware attack (with today’s date) to today’s Google Classroom post.
Please note that upon completion of this lab, you will need me to reset your Windows 7 Virtual Environment. Please notify me when you are ready for me to reset the environment.
Please do your best to complete this Lab by the end of the class period today.
Assigned: March 22nd, 2023 Teacher Pacing Due Date: March 22nd, 2023
The student will summarize the techniques used in security assessments.
Resources:
See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf
Assignment:
Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 7th, 2023 Teacher Pacing Due Date: March 8th, 2023