Tag Archives: Spring 2023

CYBER.ORG – 1.2.3 – Trojans, Backdoors, and RATs, Lesson 4.1.6 – Exploitation Frameworks & Lab – Backdoor

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack, and use the appropriate tool to assess organizational security. .

Resources:

  • See PowerPoint presentations: 1.2.3 – Trojans, Backdoors, and RATs.pptx,  4.1.6 – Exploitation Frameworks.pptx, and Lab – Backdoor.pptx

Assignment:

  1. Begin by reading the 1.2.3 – Trojans, Backdoors, and RATs.pptx and  4.1.6 – Exploitation Frameworks.pptx presentations.
  2. Read and complete the lab activity in the Lab – Backdoor.pptx document.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: March 28th, 2023
Teacher Pacing Due Date: March 29th, 2023

CYBER.ORG – 1.2.2 – Ransomware and Crypto-Malware & Lab – Ransomware Attack

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: 1.2.2 Ransomware and Crypto-Malware and Lab – Ransomware Attack.pptx

Assignment:

  1. Begin reading the 1.2.2 Ransomware and Crypto-Malware.pptx presentation.
  2. Read and complete the lab activity in the Lab – Ransomware Attack.pptx document.
  3. To confirm completion the lab activity, upload a screenshot of the activated Ransomware attack (with today’s date) to today’s Google Classroom post.
  4. Please note that upon completion of this lab, you will need me to reset your Windows 7 Virtual Environment. Please notify me when you are ready for me to reset the environment.
  5. Please do your best to complete this Lab by the end of the class period today.

Assigned: March 22nd, 2023
Teacher Pacing Due Date: March 22nd, 2023

CYBER.ORG – 1.2.1 – Malware & Case Study – Malware

Objective: Given a scenario, analyze indicators of compromise and determine the type of malware.

Resources:

  • See PowerPoint presentation: 1.2.1 Malware.pptx
  • See PDF Document: Case Study – Malware

Assignment:

  1. Begin reading the 1.2.1 Malware.pptx presentation.
  2. Read the Case Study – Malware 2023.pdf document and be prepared to answer the questions at the end.
  3. Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Wednesday.

Assigned: March 20th, 2023
Teacher Pacing Due Date: March 22nd, 2023

CYBER.ORG – 1.8.1 – Pentesting, 1.8.2 – Pentest Exercise Types & Case Study – Pen Testing

Objective:

The student will explain the techniques used in
penetration testing.

Resources:

  • See PowerPoint presentations 1.8.1 – Pentesting.pptx, 1.8.2 – Pentest Exercise Types.pptx, and PDF document Case Study – Pen Testing.pdf

Assignment:

  1. Begin reading the 1.8.1 – Pentesting.pptx and 1.8.2 – Pentest Exercise Types.pptx presentations.
  2. Familiarize yourself with the purpose of penetration testing and
    some different ways of conducting this testing.
  3. Read the Case Study – Pen Testing.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today. This Case Study will be the final assignment of the 3rd Term.

Assigned: March 8th, 2023
Teacher Pacing Due Date: March 8th, 2023

CYBER.ORG – 1.7.1 – Threat Hunting, 1.7.2 – Vulnerability Scans, 1.7.3 – SIEM and SOAR, & Case Study – Bug Bounty

Objective:

The student will summarize the techniques used in
security assessments.

Resources:

  • See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf

Assignment:

  1. Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
  2. Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
  3. Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 7th, 2023
Teacher Pacing Due Date: March 8th, 2023

CYBER.ORG – 1.6.1 – Vulnerability Types, 1.6.2 – Vulnerability Impacts & Case Study – Zero Day Attack

Objective:

The student will explain the security concerns
associated with various types of vulnerabilities.

Resources:

  • See PowerPoint presentations 1.6.1 – Vulnerability Types.pptx,1.6.2 – Vulnerability Impacts.pptx and PDF document Case Study – Zero Day Attack.pdf

Assignment:

  1. Begin reading the 1.6.1 – Vulnerability Types.pptx and 1.6.2 – Vulnerability Impacts.pptx presentations.
  2. Familiarize yourself with some common types of network security vulnerabilities and their impacts.
  3. Read the Case Study – Zero Day Attack.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 6th, 2023
Teacher Pacing Due Date: March 7th, 2023

CYBER.ORG – 1.5.3 – Threat Intelligence Sources

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.3 – Threat Intelligence Sources.pptx

Assignment:

  1. Begin reading the 1.5.3 – Threat Intelligence Sources.pptx presentation.
  2. Familiarize yourself with some common threat intelligence and research sources.
  3. Please do your best to complete this reading assignment by the end of the class period today.

Assigned: March 3rd, 2023
Teacher Pacing Due Date: March 3rd, 2023

CYBER.ORG – 1.5.2 – Threat Vectors & Case Study – Stuxnet

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.2 – Threat Vectors.pptx and PDF document Case Study – Stuxnet 2023.pdf

Assignment:

  1. Begin reading the 1.5.2 – Threat Vectors.pptx presentation.
  2. Familiarize yourself with seven common threat vectors attackers can use to gain access to a network.
  3. Read the Case Study – Stuxnet 2023.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: March 1st, 2023
Teacher Pacing Due Date: March 3rd, 2023

CYBER.ORG – 1.5.1 – Threat Actors & Case Study – Insider Threat

Objective:

The student will explain different threat actors, vectors,
and intelligence sources.

Resources:

  • See PowerPoint presentation: 1.5.1 – Threat Actors.pptx and PDF document Case Study – Insider Threat.pdf

Assignment:

  1. Begin reading the 1.5.1 – Threat Actors.pptx presentation.
  2. Familiarize yourself with some common threat actors and their motives.
  3. Read the Case Study – Insider Threat.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: February 27th, 2023
Teacher Pacing Due Date: February 28th, 2023

CYBER.ORG – 1.1.14 – Influence Campaigns & Case Study – The Cybersecurity Problem with Influence Campaigns

Objective:

The student will compare and contrast different types
of social engineering techniques.

Resources:

  • See PowerPoint presentation: 1.1.14 – Influence Campaigns.pptx and PDF document Case Study – The Cybersecurity Problem with Influence Campaigns.pdf

Assignment:

  1. Begin reading the 1.1.14 – Influence Campaigns.pptx presentation.
  2. Familiarize yourself with the pattern and practice of Pretexting, and defenses against this type of social engineering technique.
  3. Read the Case Study – The Cybersecurity Problem with Influence Campaigns.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today.

Assigned: February 24th, 2023
Teacher Pacing Due Date: February 25th, 2023