Tag Archives: Term 1

INTRO TO CYBER SECURITY – DAY 1: BEGINNING THE LINUX JOURNEY – FALL 2022

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies by learning the basics of the Linux operating system.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux

Assignment:

  1. The first step on our journey to Cybersecurity proficiency is to gain proficiency in the Linux operating system. A large portion of the systems that run the Internet run on a variant of Linux, and therefore learning how to effectively use the Linux command line will be a necessary step towards gaining this proficiency.
  2. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  3. Once you have completed the today’s activity, the rest of the time is yours. Use it wisely, and enjoy a peaceful denouement (Look it up!) to the 2nd week of school!
  4. Don’t forget there’s an I-Day on Monday! Keep an eye on your Microsoft Teams around 10am for Monday’s asynchronous activity, and complete it to make sure you get marked as “present” for the day!
  5. Have a great weekend, and I’ll see you all in-person on Tuesday, when we will begin working with the Command Line Interface in Linux, and investigate a few important commands.

Assigned: August 19th, 2022
Teacher Pacing Due Date: August 19th, 2022

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2022

Objective:

I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past week together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Chrome and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 16th, 2022
Teacher Pacing Due Date: August 16th, 2022

INTRO TO NETOP – CLASS POLICIES AND PROCEDURES 2022-23

Objective:

  • I can agree to abide by the class policies by reviewing the established policies and procedures to help ensure the classroom is a safe and fun place for everyone.

Links:

None.

Topics Discussed:

  • Classroom policies and procedures
  • Computer Acceptable Use Policy

Assignment:

  1. Welcome back! Today we’re going to go over the class rules, or as I like to call them, the policies and procedures.
  2. Society’s based on policies and procedures. Without ’em, we’re no better than poo-flinging monkeys in the jungle. Humans agree to abide by laws so we can all get along and get things accomplished with a minimum of screaming, head-bashing and poo-flinging.
  3. The policies and procedures are pretty straightforward, and they’re all posted in the front of the room where you can see them at all times. They’re all really based on one simple thing: respect.
    1. I’m going to show you respect at all times in the classroom, and all I ask is that you return the favor.
    2. I also ask that you treat everyone else with respect, so that they can do the same for you.
    3. The chairs have wheels for a reason: if you need to scoot over to collaborate with a partner, that’s great. Don’t use them to scoot all over the room, and don’t get up and wander aimlessly. Move with purpose.
    4. Have respect for other people who are trying to get work done, and don’t bother them. Don’t steal anybody’s work (or stuff, for that matter).
    5. Treat my stuff and the school’s stuff with respect, so that it can stay in good shape for you and for everyone else. Let me know right away if anything is marked, damaged or missing so I can address it immediately.
    6. We’re going to have a lot of opportunities to critique the work of others in this class. Keep it respectful, positive and constructive, please. Don’t feel bad if someone else critiques your work, it’s only going to help you improve and get stronger.
    7. I’ve got a lot of cool stuff to teach you in this class. Please don’t make it any harder for me than it already is by disrupting my class, or making it harder for the people around you to pay attention.
    8. I promise not to come to your room and mess it up; can you do me the same courtesy? I’d appreciate it.
    9. Don’t leave the room without my permission. I need to know where you are at all times. If you need to leave the room, please sign out on the digital sign-out sheet provided.
    10. Read your Student Handbook! We all (you and me both) are required to abide by its policies, so it’s important to know exactly what those policies are so you don’t violate them unintentionally (Or intentionally!).
  4. Do any of the class policies seem strange? Like something you shouldn’t have to be asked not to do? Guess what: the reason that policy’s in place is because some knucklehead decided to be a creep and had to be told to stop. Please: Don’t be that guy.
  5. If you can agree to abide by these policies and procedures, then we can all get along. If there’s anything you feel like you can’t agree to here, let me know and we can talk it over.

Posted: August 10th, 2022

Plans for Success 2022-23

Objective:

  • I can read and understand the class Plan for Success, and take it home to share with my parents/guardians and prove that my parents and I understand and agree to its contents by returning it with my and their signatures so that we can all understand our rights and responsibilities as learners.

Links:

Networking and Cybersecurity 1-2 H Plan For Success 2022-23

Topics Discussed:

  • Networking and Cybersecurity 1-2 H Plan for Success

Assignment:

  1. Hey, you’re back! It’s good to see you again. Today, we’re going to take care of some official business called the Plan for Success.
  2. When you get to the college or university level, every class you’re going to take has something called a syllabus. It’s basically a legal document that defines what you can expect from the professor, and what they expect from you. It’s a pretty important thing! The Plan for Success is essentially the same thing for this class.
  3. Why is it so important? Well, since it’s a legally binding document, if a professor violates the terms of the published syllabus in a way that a student feels negatively affects them, that student can take the professor to court. Side note: please don’t take me to court. If you see a problem with the Plan for Success, just let me know and I’ll fix it.
  4. I’m going to point out the important parts of the Plan for Success for you later, but it’s your responsibility to read it in full and make sure you understand it, because everything we do from here on out is going to be governed by this document. If you have any questions about the document, make sure you take time to ask me so I can explain anything you don’t understand.
  5. Once you’ve read it and fully understand it, sign it at the bottom to signify your understanding and agreement to follow the plan.
  6. Put it someplace safe, and take it home with you. Show it to your folks tonight, and tell them what we talked about today. Make sure they understand what you’re getting into, and have them sign it to confirm that they understand the details. Bring it back to me by the end of the week (August 12th, 2022).

Assigned: August 9th, 2022
Due Date: August 12th, 2022

First Day 2022 – Welcome to Networking and Cybersecurity!

Objective:

  • I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.

Links:
None.

Topics Discussed:

  • Networking
  • Cybersecurity
  • Room 225
  • Mister Marmolejo
  • Yourself!

Assignment:

Welcome to my classroom website for Networking and Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Take a look around! I’ll explain everything here very soon.
  2. Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
  3. The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret words “Lemon Sherbet“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.

Posted: August 8th, 2022

CYBER.ORG – 4.3.1 – Log Files Types, 4.3.2 – Types of Logs, 4.3.3 – Metadata & Metadata Lab

Objective:

Given an incident, utilize appropriate data sources to
support an investigation.

Resources:

  • See PowerPoint presentations: 4.3.1 Log Files Types.pptx, 4.3.2 – Types of Logs.pptx, 4.3.3 – Metadata.pptx, Lab – Juice Shop Setup & Lab – Metadata.pptx

Assignment:

  1. Begin reading the three lesson presentations. These lessons will introduce you to data sources that are required to support an investigation following a Cybersecurity-related incident.
  2. Next, read and follow the instructions in the Lab – Juice Shop Setup.pptx presentation. You will need to complete these steps first before you attempt the next Lab.
  3. Once you have completed the Juice Shop Setup, read and follow the instructions in the Lab – Metadata.pptx Lab presentation.
  4. To complete this lab, take a screenshot of the screen confirming that you are logged into the Juice Shop as John and post this screenshot to today’s Assignment form posted in the Google Classroom.
  5. This will be the final lab and the final assignment grade of the first term. This lab is self paced, but do your best to complete it by the end of the day on Thursday, September 30th.

Assigned: September 28th, 2021
Teacher Pacing Due Date: September 30th, 2021

CYBER.ORG – 4.1.5 – Forensic Tools + Autopsy LAB

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.5 Forensic Tools.pptx, Lab – Autopsy.pptx

Assignment:

  1. Begin reading the 4.1.5 Forensic Tools.pptx presentation. This lesson will introduce you to several digital forensics tools including the Autopsy app, a powerful tool for hard drive data analysis.
  2. Next, read and follow the instructions in the Lab – Autopsy.pptx Lab presentations. We will also have time to work on this lab in tomorrow’s class meeting.
  3. When you have completed the lab and found the images, take a screenshot of the View Notes screen showing the notes you left following the image downloads that you completed, and post this screenshot to today’s Assignment form posted in the Google Classroom.
  4. This lab is self paced, but do your best to complete it by the end of the day on Tuesday, September 28th.

Assigned: September 27th, 2021
Teacher Pacing Due Date: September 28th, 2021

CYBER.ORG – 4.1.8 – DATA Sanitization tools & 2.7.2 – Data DESTRUCTION

Objective: Given a scenario, carry out data security and privacy practices.

Resources:

  • See PowerPoint presentations: 4.1.8 – Data Sanitization; 2.7.2 – Data Destruction

Assignment:

  1. Begin reading the 4.1.8 – Data Sanitization and the 5.8.1 – Data Destruction.pptx presentation.
  2. Complete the lab in the Lab – Data Sanitization.pptx presentation.
  3. Read the Case Study – Data Destruction document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.

Assigned: September 23rd, 2021
Teacher Pacing Due Date: September 27th, 2021

CYBER.ORG – 4.1.4 – Packet Capture and Replay Tools + TCPDump Lab + Wireshark Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx

Assignment:

  1. Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
  2. Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
  3. When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Tuesday, September 21st.

Assigned: September 20th, 2021
Teacher Pacing Due Date: September 21st, 2021

CYBER.ORG – 4.1.1 – Network Reconnaissance and Discovery Tools LAB WORK

Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.

Resources:

  • See PowerPoint presentations: Lab – ifconfig.pptx & Lab – Traceroute.pptx

Assignment:

  1. Begin reading the Lab – ifconfig.pptx & Lab – Traceroute.pptx. These lessons will provide practice with two very useful Linux networking command line tools.
  2. Follow the instructions in each of the Lab presentations.
  3. The Traceroute lab will ask questions that you will be required to answer in a form posted in the Google Classroom.
  4. These labs are self paced, but do your best to complete them by the end of the day on Friday, September 17th.

Assigned: September 16th, 2021
Teacher Pacing Due Date: September 16th, 2021