Tag Archives: Term 4

CYBER.ORG – 6.1.7 – Perfect Forward Secrecy and Security Through Obscurity

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.7 Perfect Forward Secrecy and Security Through Obscurity

Assignment:

  1. Begin reading the 6.1.7 Perfect Forward Secrecy and Security Through Obscurity.pptx presentation.

Assigned: March 31st, 2021
Teacher Pacing Due Date: April 1st, 2021

CYBER.ORG – 6.1.8 – Common Cryptography Use Cases

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See attached PowerPoint presentation: 6.1.8 Common Cryptography Use Cases

Assignment:

  1. Begin reading the 6.1.8 Common Cryptography Use Cases.pptx presentation.

Assigned: March 31st, 2021
Teacher Pacing Due Date: April 1st, 2021

CYBER.ORG – 6.1.4 – Steganography

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.4 – Steganography

Assignment:

  1. Begin reading the 6.1.4 – Steganography.pptx presentation.
  2. Complete the lab in the Lab – Steganography.pptx presentation.
  3. Turn in the resulting “image4.jpg” file with a message of your choice hidden in the image using the steghide app. Upload this image to today’s Google Classroom assignment post. We will use these images in tomorrow’s class session. (So keep your messages classy!)
  4. During tomorrow’s Late Start class session, we will read the Case Study – Steganography document and be prepared to answer the questions at the end.
  5. A Google Form will be provided to answer the Case Study questions tomorrow morning.

Assigned: March 23rd, 2021

Teacher Pacing Due Date: March 24th, 2021

CYBER.ORG – 6.1.3 – Hashing and Digital Signatures

Objective: Compare and contrast basic cryptography concepts.

Resources:

  • See PowerPoint presentation: 6.1.3 – Hashing and Digital Signatures

Assignment:

  1. Begin reading the 6.1.3 – Hashing and Digital Signatures.pptx presentation.
  2. Complete the lab in the Lab – Collision.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 22nd, 2021

Teacher Pacing Due Date: March 23rd, 2021

CYBER.ORG – 6.2.4 – Hashing Algorithms

Objective: Explain cryptography algorithms and their basic characteristics.

Resources:

  • See PowerPoint presentation: 6.2.4 – Hashing Algorithms

Assignment:

  1. Begin reading the 6.2.4 – Hashing Algorithms.pptx presentation.
  2. Complete the lab in the Lab – File Hashing.pptx presentation.
  3. To verify completion of the lab, answer the questions in today’s assignment post in the Google Classroom.

Assigned: March 19th, 2021

Teacher Pacing Due Date: March 22nd, 2021

Final Day 2019 – So Long, Farewell, Auf Wiedersehen, Goodbye

Objectives:

  • Bid a fond farewell for now.
  • Tell Mister M how he did, and help him improve future classes.
  • Look forward to the future.

Student-Friendly Objectives:

  • I can say “Happy Trails” until we meet again.
  • I can remember what Mister M taught me, and use it to troubleshoot, fix, secure and protect computer systems and networks.

Links:
Google Classroom

Topics Discussed:

  • Networking and Operating Systems
  • Class Survey
  • Summer Vacation

Assignment:

Hello, and congratulations! You successfully made it to the end of Networking and Operating Systems 1-2H! I hope this was a fun and productive class for you, and that you learned a few things that will help you in your future endeavors.

If you could take a moment to let me know how I did, and how I can improve for future classes, I have attached a brief questionnaire on the Google Classroom page. It’s not for a grade, but your feedback will help me out a lot, and I’d appreciate it if you took a moment to fill it out with your honest opinions.

Now that we’re done, above all else:

  1. Use your powers for good, not evil. Remember the lessons of Spider-Man: “With great power, comes great responsibility.” You now have skills and abilities far beyond those of your average computer user. Use them to protect and defend, never attack.
  2. Keep using your skills! Take more computer classes and keep learning as much as you can about PC, Mac, Linux, Security and Networking technology. The more you use your knowledge, the less likely it will slip from your memory. The more you know, the more effective and valuable you are, and as more devices connect to the global network, Technical Support and Cyber Security especially will remain rapidly growing and highly lucrative fields for decades to come.
  3. Do what you love, and you’ll never work a day in your life. If you love working with computers and technology, then pursue it. If computers are just your hobby, don’t make it a job – it’ll just suck the joy out of your hobby. If you truly love working with computer hardware and software and networking technology, and you love solving problems with technology, then by all means pursue a career in the Computer Science field. As long as you love what you’re doing, every day you’ll look forward to going to work and the financial rewards will follow.

It has been my great pleasure to accompany you on your journey into Networking and Operating Systems this year. I hope that you enjoyed this class, and continue to use your newfound powers to solve the problems that are related to and created by technology, and to protect your own and others’ computer systems from the constantly emerging and evolving range of threats – both online and offline.

Posted: May 20th, 2019