Tag Archives: Term 2

CYBER.ORG – 4.5.1 – Digital Forensics Evidence, 4.5.2 – Digital Forensics Evidence Acquisition & CASE STUDY

Objective:

Explain the key aspects of digital forensics.

Resources:

  • See PowerPoint presentations: 4.5.1 – Digital Forensics Evidence.pptx, 4.5.2 – Digital Forensics Evidence Acquisition

Assignment:

  1. Begin reading the 4.5.1 – Digital Forensics Evidence.pptx presentation. This lesson will introduce you to the concept of Digital Forensics.
  2. Next, read the 4.5.2 – Digital Forensics Evidence Acquisition.pptx presentation. This lesson will introduce you to the procedures involved in collecting Digital Forensics Evidence.
  3. Finally, read the Case Study – Digital Evidence Acquisition document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Tuesday, November 8th.

Assigned: November 7th, 2022
Teacher Pacing Due Date: November 8th, 2022

CYBER.ORG – 4.4.1 Post-Incident Mitigation Techniques

Objective:

Given an incident, apply mitigation techniques or
controls to secure an environment.

Resources:

  • See PowerPoint presentation: 4.4.1 Post-Incident Mitigation Techniques.pptx

Assignment:

  1. Begin reading the 4.4.1 Post-Incident Mitigation Techniques.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.

Posted: November 4th, 2022

CYBER.ORG – 4.2.1 Incident Response Process & Case Study

Objective:

Summarize the importance of policies, processes, and
procedures for incident response.

Resources:

  • See PowerPoint presentation: 4.2.1 Incident Response Process.pptx

Assignment:

  1. Begin reading the 4.2.1 Incident Response Process.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.
  2. Next, read the Case Study – Incident Response document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the day on Friday, November 4th.

Assigned: November 2nd, 2022
Teacher Pacing Due Date: November 4th, 2022

CYBER.ORG – 4.3.1 – Log Files Types, 4.3.2 – Types of Logs, 4.3.3 – Metadata & Metadata Lab

Objective:

Given an incident, utilize appropriate data sources to
support an investigation.

Resources:

  • See PowerPoint presentations: 4.3.1 Log Files Types.pptx, 4.3.2 – Types of Logs.pptx, 4.3.3 – Metadata.pptx, Lab – Juice Shop Setup & Lab – Metadata.pptx

Assignment:

  1. Begin reading the three lesson presentations. These lessons will introduce you to data sources that are required to support an investigation following a Cybersecurity-related incident.
  2. Next, read and follow the instructions in the Lab – Juice Shop Setup.pptx presentation. You will need to complete these steps first before you attempt the next Lab.
  3. Once you have completed the Juice Shop Setup, read and follow the instructions in the Lab – Metadata.pptx Lab presentation.
  4. To complete this lab, take a screenshot of the screen confirming that you are logged into the Juice Shop as John and post this screenshot to today’s Assignment post in the Google Classroom.
  5. This lab is self paced, but do your best to complete it by the end of the day on Wednesday, November 2nd.

Assigned: October 31st, 2022
Teacher Pacing Due Date: November 2nd, 2022

CYBER.ORG – 4.1.5 – Forensic Tools + Autopsy Lab

Objective:

Given a scenario, use the appropriate tool to assess
organizational security.

Resources:

  • See PowerPoint presentations: 4.1.5 Forensic Tools.pptx, Lab – Autopsy.pptx

Assignment:

  1. Begin reading the 4.1.5 Forensic Tools.pptx presentation. This lesson will introduce you to several digital forensics tools including the Autopsy app, a powerful tool for hard drive data analysis.
  2. Next, read and follow the instructions in the Lab – Autopsy.pptx Lab presentations.
  3. When you have completed the lab and found the images, take a screenshot of the View Notes screen showing the notes you left following the image downloads that you completed, and post this screenshot to today’s Assignment form posted in the Google Classroom.
  4. This lab is self paced, but do your best to complete it by the end of the day on Friday, October 28th.

Assigned: October 26th, 2022
Teacher Pacing Due Date: October 28th, 2022

CYBER.ORG – 4.1.8 – Data Sanitization & 2.7.2 – Data Destruction

Objective: Given a scenario, carry out data security and privacy practices.

Resources:

  • See PowerPoint presentations: 4.1.8 – Data Sanitization; 2.7.2 – Data Destruction

Assignment:

  1. Begin reading the 4.1.8 – Data Sanitization and the 5.8.1 – Data Destruction.pptx presentation.
  2. Use the CYBER.ORG Cyber Range to complete the lab in the Lab – Data Sanitization.pptx presentation.
  3. Read the Case Study – Data Destruction document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.

Assigned: October 19th, 2022
Teacher Pacing Due Date: October 21st, 2022

NETWORKING AND OPERATING SYSTEMS 1H Midterm EXAM – Fall 2021

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class
  • https://us.cyberrange.org Kali Linux virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Operating Systems 1H Midterm Exam Fall 2021 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is a closed-resource exam. Please put away all study and reference materials, and please do not open any other tabs besides this one until you have submitted the quiz.
  • Please remain silent throughout the duration of the testing session.
  • While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely..

Assigned: December 14th, 2021
Teacher Pacing Due Date: December 14th, 2021

CYBER.ORG – 1.1.3 – Dumpster Diving & 1.1.4 – Shoulder Surfing, & Case Study – Dumpster Diving

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf

Assignment:

  1. Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
  2. Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
  3. Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.

Assigned: December 7th, 2021
Teacher Pacing Due Date: December 9th, 2021

CYBER.ORG – 1.1.2 – Phishing and Spam & Phishing LAB

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptxLab – Phishing.pptx

Assignment:

  • Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
  • Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
  • Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: December 2nd, 2021
Teacher Pacing Due Date: December 6th, 2021

CYBER.ORG – 1.1.8 Credential Harvesting & Credential Harvesting Lab

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.8 Credential Harvesting.pptxLab – Credential Harvesting

Assignment:

  • Begin reading the 1.1.8 Credential Harvesting.pptx presentation. This lesson will introduce you to social engineering-based attacks designed to acquire login credentials from victims.
  • Next, begin the Lab – Credential Harvesting.pptx lab.Use the Social Engineering Toolkit to launch a phishing attack.
  • Play the victim, and upload a screenshot of the successful attack screen with the “GOT A HIT!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: November 30th, 2021
Teacher Pacing Due Date: December 2nd, 2021