Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentation: Lab – Brute Force Online.pptx
Assignment:
Read the Lab – Brute Force Online.pptx presentation.
Use your Kali Linux console at the CYBER.ORG Cyber Range to follow along with the presentation and learn how to use a combination of Brute Force and a Dictionary-style attack to crack an online service’s password.
Continue through to the “Log into DVWA” slide. Take a screenshot of the DVWA login landing screen demonstrating that you have successfully logged in using the stolen credentials.
Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.
Assigned: November 21st, 2022 Teacher Pacing Due Date: November 23rd, 2022
Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentation: Lab – Dictionary Attack.pptx
Assignment:
Read the Lab – Dictionary Attack.pptx presentation.
Use your Kali Linux console at the CYBER.ORG Cyber Range to follow along with the presentation and learn how to use Dictionary Attacks to crack passwords.
Continue through to the “Launch the Attack” slide. Take a screenshot of the cracked passwords as a result of the Dictionary attack.
Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.
Assigned: November 16th, 2022 Teacher Pacing Due Date: November 18th, 2022
Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, use the appropriate tool to assess organizational security
Resources:
See PowerPoint presentations: 1.2.11 Password Attacks.pptx, 4.1.7 Password Cracking Tools, Lab – Brute Force – Offline
Assignment:
Begin reading the 1.2.11 Password Attacks.pptx presentation. This lesson will introduce you to different types of password attacks.
Next, read the 4.1.7 Password Cracking Tools presentation. This lesson will introduce you to readily accessible tools used to crack passwords.
Next, begin the Lab – Brute Force – Offline.pptx lab.
Use what you learned in today’s lab to crack the hashes downloaded from github, and post a screenshot of the cracked hashes to today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Wednesday, November 16th. We will start a new lab featuring additional password cracking techniques on Thursday.
Assigned: November 14th, 2022 Teacher Pacing Due Date: November 16th, 2022
Given a scenario, implement identity and account management controls.
Resources:
See PowerPoint presentation: Lab – Passwords
Assignment:
Read the Lab – Passwords presentation.
Use your Kali Linux console at https://apps.cyber.org to follow along with the presentation and learn how to exploit the hashed passwords in Linux to gain access to a targeted user’s account.
Continue through to the “On Your Own Activity”, and create the three different password types below. Take screenshots of the plaintext results of the mkpasswd command to confirm that each was completed:
Your own SHA-512 password with a different salt than the one used in the example
A different password using MD5 algorithm
Another password using SHA-256 algorithm
Make sure your passwords work!
Upload all three screenshots to today’s assignment post on our Google Classroom page to confirm completion of the lab.
Assigned: November 9th, 2022 Teacher Pacing Due Date: November 9th, 2022
See PowerPoint presentations: 4.5.1 – Digital Forensics Evidence.pptx, 4.5.2 – Digital Forensics Evidence Acquisition
Assignment:
Begin reading the 4.5.1 – Digital Forensics Evidence.pptx presentation. This lesson will introduce you to the concept of Digital Forensics.
Next, read the 4.5.2 – Digital Forensics Evidence Acquisition.pptx presentation. This lesson will introduce you to the procedures involved in collecting Digital Forensics Evidence.
Finally, read the Case Study – Digital Evidence Acquisition document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Tuesday, November 8th.
Assigned: November 7th, 2022 Teacher Pacing Due Date: November 8th, 2022
Given an incident, apply mitigation techniques or controls to secure an environment.
Resources:
See PowerPoint presentation: 4.4.1 Post-Incident Mitigation Techniques.pptx
Assignment:
Begin reading the 4.4.1 Post-Incident Mitigation Techniques.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.
Summarize the importance of policies, processes, and procedures for incident response.
Resources:
See PowerPoint presentation: 4.2.1 Incident Response Process.pptx
Assignment:
Begin reading the 4.2.1 Incident Response Process.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.
Next, read the Case Study – Incident Response document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Friday, November 4th.
Assigned: November 2nd, 2022 Teacher Pacing Due Date: November 4th, 2022
Given an incident, utilize appropriate data sources to support an investigation.
Resources:
See PowerPoint presentations: 4.3.1 Log Files Types.pptx, 4.3.2 – Types of Logs.pptx, 4.3.3 – Metadata.pptx, Lab – Juice Shop Setup & Lab – Metadata.pptx
Assignment:
Begin reading the three lesson presentations. These lessons will introduce you to data sources that are required to support an investigation following a Cybersecurity-related incident.
Next, read and follow the instructions in the Lab – Juice Shop Setup.pptx presentation. You will need to complete these steps first before you attempt the next Lab.
Once you have completed the Juice Shop Setup, read and follow the instructions in the Lab – Metadata.pptx Lab presentation.
To complete this lab, take a screenshot of the screen confirming that you are logged into the Juice Shop as John and post this screenshot to today’s Assignment post in the Google Classroom.
This lab is self paced, but do your best to complete it by the end of the day on Wednesday, November 2nd.
Assigned: October 31st, 2022 Teacher Pacing Due Date: November 2nd, 2022
Given a scenario, use the appropriate tool to assess organizational security.
Resources:
See PowerPoint presentations: 4.1.5 Forensic Tools.pptx, Lab – Autopsy.pptx
Assignment:
Begin reading the 4.1.5 Forensic Tools.pptx presentation. This lesson will introduce you to several digital forensics tools including the Autopsy app, a powerful tool for hard drive data analysis.
Next, read and follow the instructions in the Lab – Autopsy.pptx Lab presentations.
When you have completed the lab and found the images, take a screenshot of the View Notes screen showing the notes you left following the image downloads that you completed, and post this screenshot to today’s Assignment form posted in the Google Classroom.
This lab is self paced, but do your best to complete it by the end of the day on Friday, October 28th.
Assigned: October 26th, 2022 Teacher Pacing Due Date: October 28th, 2022