Tag Archives: Term 1

CYBER.ORG – WELCOME TO THE CYBER RANGE – FALL 2023

Objective:

Students will begin preparing for proficiency in cyber security by connecting to the CYBER.ORG Cyber Range.

Link:

Assignment:

  1. Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
  2. A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
  3. Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
  4. Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
  5. We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface this Tuesday, following the I-Day scheduled on Monday.

Assigned: August 18th, 2023
Teacher Pacing Due Date: August 18th, 2023

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2023

Objective:

I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past week and a half together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc. Add a couple more sentences about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Chrome and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 16th, 2023
Teacher Pacing Due Date: August 16th, 2023

Meet Your Mac Activity Fall 2023

Objective:

  • I can effectively navigate the Macintosh OS, and change my desktop wallpaper, mouse settings and desktop settings using the System Preferences so I can customize and configure my Mac workspace to suit my preferences.

Links:

None

Topics Discussed:

  • Mac OSX Ventura
  • Desktop
  • Menu Bar
  • System Preferences
  • Mouse
  • Dock
  • Icons
  • Finder
  • Trash
  • Launchpad
  • Documents
  • Finder Window
  • Finder Window Views
  • Safari
  • Google Image Search
  • Resolution

Assignment:

  1. Today we’ll begin our introduction to the Macintosh operating system.
  2. Follow along with the in-class demonstrations to learn how to:
    • Log in using your newly created account.
    • Change your password, if you wish to do so.
    • Navigate through the OSX Ventura operating system.
    • Activate and use the virtual assistant, Siri.
    • Identify and use items on the desktop, including the Finder, application icons, the menu bar, the dock, the trash and the Launchpad.
    • Use the System Preferences panel to adjust your Desktop wallpaper and your Mouse settings (enable right click).
    • Open a new Finder window and navigate to your Documents folder to store files and folders.
    • Use the Finder window to view files and folders in different ways.
    • Adjust the Finder Preferences to see all items on the desktop.
    • Use Safari to browse the web
      • Locate and bookmark the class website (https://netop.mistermarmolejo.com).
    • Use Google Image Search to find an appropriate image to personalize your desktop. (Keep it classy!)
    • Use the Search Tools underneath the search bar to search for Large images with higher resolutions for the best results.
    • Remember: for the image to look good on your desktop, it has to have a minimum horizontal resolution of 1920 pixels!

Posted: August 15th, 2023

ACCOUNT SETUP 2023-24

Objectives:

  • Create and test student login accounts.

Objective:

  • I can successfully log on to the lab workstations.

Links:

Lab Use Policy Presentation

Topics Discussed:

  • Proper use of school and network resources
  • Software Copying
  • Copyright
  • Software Privacy and Vandalism
  • Care of Equipment
  • Food and Drink Policy
  • Internet Usage Guidelines
  • Consequences of Policy Violation

Assignment:

  1. Today I’ll walk you through the process of logging in to the computer for the first time.
  2. Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you get logged in today so you’re ready for this week’s lessons.

Posted: August 14th, 2023

INTRO TO NETCYBER – CLASS POLICIES AND PROCEDURES 2023-24

Objective:

  • I can agree to abide by the class policies by reviewing the established policies and procedures to help ensure the classroom is a safe and fun place for everyone.

Links:

None.

Topics Discussed:

  • Classroom Policies and Procedures
  • Computer Acceptable Use Policy

Assignment:

  1. Welcome back! Today we’re going to go over the class rules, or as I like to call them, the Policies and Procedures.
  2. Society’s based on policies and procedures. Without ’em, we’re no better than poo-flinging monkeys in the jungle. Humans agree to abide by laws so we can all get along and get things accomplished with a minimum of screaming, head-bashing and poo-flinging.
  3. The policies and procedures are pretty straightforward, and they’re all posted in the front of the room where you can see them at all times. They’re all really based on one simple thing: respect.
    1. I’m going to show you respect at all times in the classroom, and all I ask is that you return the favor.
    2. I also ask that you treat everyone else with respect, so that they can do the same for you.
    3. The chairs have wheels for a reason: if you need to scoot over to collaborate with a partner, that’s great. Don’t use them to scoot all over the room, and don’t get up and wander aimlessly. Move with purpose.
    4. Have respect for other people who are trying to get work done, and don’t bother them. Don’t steal anybody’s work (or stuff, for that matter).
    5. Treat my stuff and the school’s stuff with respect, so that it can stay in good shape for you and for everyone else. Let me know right away if anything is marked, damaged or missing so I can address it immediately.
    6. We’re going to have a lot of opportunities to critique the work of others in this class. Keep it respectful, positive and constructive, please. Don’t feel bad if someone else critiques your work, it’s only going to help you improve and get stronger.
    7. I’ve got a lot of cool stuff to teach you in this class. Please don’t make it any harder for me than it already is by disrupting my class, or making it harder for the people around you to pay attention.
    8. I promise not to come to your room and mess it up; can you do me the same courtesy? I’d appreciate it.
    9. Don’t leave the room without my permission. I need to know where you are at all times. If you need to leave the room, please sign out on the digital sign-out sheet provided.
    10. Read your Student Handbook! We all (you and me both) are required to abide by its policies, so it’s important to know exactly what those policies are so you don’t violate them unintentionally (Or intentionally!).
  4. Do any of the class policies seem strange? Like something you shouldn’t have to be asked not to do? Guess what: the reason that policy’s in place is because some knucklehead decided to be a creep and had to be told to stop. Please: Don’t be that guy.
  5. If you can agree to abide by these policies and procedures, then we can all get along. If there’s anything you feel like you can’t agree to here, let me know and we can talk it over.

Posted: August 9th, 2023

INTRO TO NETWORKING AND CYBERSECURITY FALL 2023 – GETTING TO KNOW YOU

Objective:

  • I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.

Links:
None.

Topics Discussed:

  • Networking and CyberSecurity
  • Room 225
  • Mister Marmolejo
  • Yourself!

Assignment:

Welcome to my classroom website for Networking and CyberSecurity 1-2H! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.

Posted: August 8th, 2023

First Day Fall 2023 – Welcome to Networking and Cybersecurity!

Objective:

  • I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.

Links:
None.

Topics Discussed:

  • Networking
  • Cybersecurity
  • Room 225
  • Mister Marmolejo
  • Yourself!

Assignment:

Welcome to my classroom website for Networking and Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Take a look around! I’ll explain everything here very soon.
  2. Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
  3. The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret words “Mocha Latte“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.

Posted: August 7th, 2023

1st Quarter Reflection – Fall 2022

Objective:

  • I can reflect on my involvement and engagement with the lessons I have learned during the 1st Quarter of Fall 2022 by answering a series of reflective questions so that I can identify my areas of strength and opportunities for growth.

Vocabulary Words:

  • Reflection
  • Linux Basics

Links:
https://classroom.google.com

Topics Discussed:

  • Reflection
  • Linux Basics

Assignment:

  1. Connect to the Google Classroom site and click on the link to the Google Form at the bottom of the latest post.
  2. Think back from the beginning of the school year to now, and answer the questions provided to reflect on your successes and struggles throughout the first quarter.
  3. You must have at least two complete sentences for each question in each prompt, but use as many sentences as you need to complete your short answer.
  4. Once you have answered all the questions, continue to the next section until the Submit button appears. Click the Submit button at the bottom of the page to submit your final responses. Do not click any other buttons or navigate away from the page before submitting your answers, or they may be erased. You may even wish to type your answers in a Google Doc or Word Document and then transfer them to the form.
  5. Once you have submitted your form, return to the Google Classroom assignment post, and click the Mark as Done button to mark this assignment as completed and ready for grading.
  6. Your response will be graded on the following criteria: meeting minimum length requirements, clarity, original ideas and mechanics (spelling, grammar and punctuation).
  7. You should consider this a professional post-mortem of a long-form academic project, and conduct yourself accordingly.
  8. Good luck, and thanks for all your hard work in the first quarter! Enjoy your Fall Break, and I’ll see you on the 17th when we’ll get started with advanced network security tools within the Linux environment!

Assigned: October 7th, 2022
Teacher Pacing Due Date: October 7th, 2022

CYBER.ORG – 4.1.4 – Packet Capture and Replay Tools + TCPDump Lab + Wireshark Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx

Assignment:

  1. Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
  2. Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
  3. When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Wednesday, October 5th.

Assigned: October 3rd, 2022
Teacher Pacing Due Date: October 5th, 2022

CYBER.ORG 4.1.1 & 4.1.3 – Shell and Script Environments and Network Reconnaissance and Discovery

Objective: Given a scenario, the student will use the appropriate
tool to assess organizational security.

Resources:

  • See PowerPoint presentation: 4.1.1 – Network Reconnaissance and Discovery Tools and 4.1.3 – Shell and Script Environments

Assignment:

  1. Download and read the 4.1.3. – Shell and Script Environments presentation to learn about the different interfaces available within Linux.
  2. Next, download and read the 4.1.1 – Network Reconnaissance and Discovery Tools presentation to get details about the many network discovery tools available within Kali Linux. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
  3. We will be using the information in these presentations in a series of labs that will be issued next week.

Assigned: September 28th, 2022
Teacher Pacing Due Date: September 30th, 2022