Tag Archives: Term 2

CYBER.ORG – 1.1.1 – Principles of Social Engineering

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

  • See PowerPoint presentation: 1.1.1 – Principles of Social Engineering.pptx

Assignment:

  1. Read the 1.1.1 – Principles of Social Engineering.pptx presentation. This lesson will introduce you to Social Engineering and how it is used to manipulate people into doing things that they ordinarily would not do.
  2. Please read through the presentation by the end of the day on Monday, November 29th.

Assigned: November 29th, 2021
Teacher Pacing Due Date: November 29th, 2021

CYBER.ORG – 2.8.7 – Common Cryptography Use Cases

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentation: 2.8.7 – Common Cryptography Use Cases.pptx

Assignment:

  1. Read the 2.8.7 – Common Cryptography Use Cases.pptx presentation. This lesson will introduce you to how and why cryptography is commonly used, and why it is so important.
  2. Please read through the presentation by the end of the day on Monday, November 22nd.

Assigned: November 22nd, 2021
Teacher Pacing Due Date: November 22nd, 2021

CYBER.ORG – 2.8.6 – Steganography CASE STUDY

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PDF Document: Case Study – Steganography.pdf

Assignment:

  1. Begin reading the Case Study – Steganography.pdf document and be prepared to answer the questions at the end.
  2. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  3. Please do your best to complete this Case Study by the end of the day today, Thursday, November 13th.
  4. Check your Synergy to ensure that you have received credit for all assignments that you have turned in before tomorrow’s three-week grade report.

Assigned: November 13th, 2021
Teacher Pacing Due Date: November 13th, 2021

CYBER.ORG – LAB – STEGANOGRAPHY

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: Lab – Steganography

Assignment:

  1. Begin reading and complete the lab in the Lab – Steganography.pptx presentation.
  2. Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post.
  3. Please include the message/password along with your image so Mister can test it! We will use these images in Thursday’s class session. (So keep your messages classy!)
  4. On Thursday, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
  5. A Google Form will be provided to answer the Case Study questions Thursday afternoon. This will be the last assignment of this three-week grading period.

Assigned: November 16th, 2021
Teacher Pacing Due Date: November 18th, 2021

CYBER.ORG – 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentations: 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption

Assignment:

  1. Read the 2.8.5 – Block Ciphers and Lightweight Cryptography.pptx presentation. This lesson will introduce you to cryptographic methodologies and discuss their benefits and drawbacks.
  2. Next, read the 2.8.6 – Steganography and Homomorphic Encryption.pptx presentation. This lesson will introduce you to the concept of Steganography, which we will be working with for the next couple of class meetings.
  3. Please read through both of these by the end of the day on Monday, November 15th, as we will be performing a Steganography Lab in class tomorrow.

Assigned: November 15th, 2021
Teacher Pacing Due Date: November 15th, 2021

CYBER.ORG – 2.8.3 Quantum Cryptography and Ephemeral Keys & 2.8.4 Cryptography Modes of Operation and Blockchains

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentations: 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx, 2.8.4 Cryptography Modes of Operation and Blockchains.pptx

Assignment:

  1. Read the 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx presentation. This lesson will introduce you to Quantum Cryptography, Ephemeral Keys and their importance in securing data.
  2. Next, read the 2.8.4 Cryptography Modes of Operation and Blockchains.pptx presentation. This lesson will introduce you to Cryptography modes and the concept of a Blockchain.
  3. Please read through both of these by the end of the day on Thursday, November 4th.

Assigned: November 4th, 2021
Teacher Pacing Due Date: November 4th, 2021

CYBER.ORG – LAB – Brute Force Online

Objective:

Given a scenario, analyze potential indicators to determine the type of attack.

Given a scenario, use the appropriate tool to assess organizational security.

Resources:

  • See PowerPoint presentation: Lab – Brute Force Online.pptx

Assignment:

  1. Read the Lab – Brute Force Online.pptx presentation.
  2. Use your Kali Linux console at https://uscyberrange.org to follow along with the presentation and learn how to use a combination of Brute Force and a Dictionary-style attack to crack an online service’s password.
  3. Continue through to the “Log into DVWA” slide. Take a screenshot of the DVWA login landing screen demonstrating that you have successfully logged in using the stolen credentials.
  4. Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: November 2nd, 2021
Teacher Pacing Due Date: November 4th, 2021

CYBER.ORG – LAB – Dictionary Attack

Objective:

Given a scenario, analyze potential indicators to determine the type of attack.

Given a scenario, use the appropriate tool to assess organizational security.

Resources:

  • See PowerPoint presentation: Lab – Dictionary Attack.pptx

Assignment:

  1. Read the Lab – Dictionary Attack.pptx presentation.
  2. Use your Kali Linux console at https://uscyberrange.org to follow along with the presentation and learn how to use Dictionary Attacks to crack passwords.
  3. Continue through to the “Launch the Attack” slide. Take a screenshot of the cracked passwords as a result of the Dictionary attack.
  4. Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: November 1st, 2021
Teacher Pacing Due Date: November 3rd, 2021

CYBER.ORG – LAB – Rainbow Table

Objective:

Given a scenario, analyze potential indicators to determine the type of attack.

Given a scenario, use the appropriate tool to assess organizational security.

Resources:

  • See PowerPoint presentation: Lab – Rainbow Table.pptx

Assignment:

  1. Read the Lab – Rainbow Table.pptx presentation.
  2. Use your Kali Linux console at https://uscyberrange.org to follow along with the presentation and learn how to use Rainbow Tables to crack passwords.
  3. Continue through to the “Observe the Results” slide. Take a screenshot of the solved passwords as a result of the Rainbow Table attack.
  4. Upload this screenshot to today’s assignment post on our Google Classroom page to confirm completion of the lab.

Assigned: October 28th, 2021
Teacher Pacing Due Date: October 28th, 2021

I-DAY – MONDAY, OCTOBER 25TH – ASYNCRHONOUS ACTIVITY

Happy Asynchronous Monday!

No class meeting today! I hope you’re all enjoying a little extra sleep or a little quality time in the comfort of your own homes.

To complete today’s Asynchronous Activity and verify your attendance, please click the link below to visit today’s Assignment Post in our Google Classroom, and open the attached “Career Exploration Mini Lesson” Google Doc. Follow along with the instructions, answer the questions within, and submit the completed form before the end of the day today.

Thanks for stopping by, and enjoy the rest of your (nearly) three-day weekend! See you on Tuesday!

Posted: October 25th, 2021