Cyber Capstone
*********
*********
Due Date: August 23, 2023

Click here to gain access. https://codehs.com/go/F759E
or
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 


curriculum outline below: https://cyber.instructure.com/courses/100

*********
*********

Course Outline for Cyber Capstone 	 	 	 	 

Unit 1 - Actors/Motivations, CIA & Authentication
Unit 1 Lesson Plan

2.1.1 - Threat Actors	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Stuxnet	Quiz : Key
1.2.1 - CIA Triad and AAA	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.6.2 - Multifactor Authentication (MFA)	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Biometrics	Quiz : Key
2.4.14 - Password Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Passwords
Lab - Rainbow Table
Lab - Brute Force Offline
Lab - Brute Force Online	Quiz : Key
4.6.3 - Passwords	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Dictionary	Quiz : Key
 	 	 	 	 
Unit 2 - Social Engineering & Access Control
Unit 2 Lesson Plan

2.2.2 - Principles of Social Engineering	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Influence Campaigns	Quiz : Key
2.2.3 - Phishing and Spam	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Credential Harvesting
Case Study - Salesforce Phishing	Quiz : Key
5.6.1 - Phishing Awareness	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Phishing	Quiz : Key
2.2.4 - Misinformation and Impersonation	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Hoaxes	Quiz : Key
2.2.5 - Watering Hole Attacks and Typosquatting	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Typosquatting
Case Study - Watering Hole	Quiz : Key
5.6.2 - Security Awareness	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Insider Threat	Quiz : Key
 	 	 	 	 
Unit 3 - Threats &s; Attack Surfaces
Unit 3 Lesson Plan

2.4.1 - Malware	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Malware	Quiz : Key
2.4.2 - Ransomware	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Ransomware
Case Study - FBI Response to REvil Ransomware	Quiz : Key
2.4.3 - Trojans, Backdoors, and RATs	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Trojan
Lab - Backdoor
Lab - RAT/Bot
Case Study - The TeaBot Malware Goes Global	Quiz : Key
2.4.4 - Viruses, Worms, Spyware &s; Adware	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.5 - Keyloggers	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Intro to Keyloggers
Lab - Keylogger Application	Quiz : Key
2.4.6 - Logic Bombs &s; Rootkits	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Logic Bomb	Quiz : Key
2.2.1 - Common Attack Surfaces	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Wireless Security	Quiz : Key
2.4.8 - DoS and DDoS Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Denial of Service
Case Study - Botnet	Quiz : Key
2.4.9 - DNS Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.10 - Wireless, On-Path, and Replay Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Session Replay
Case Study - Wireless Disassociation	Quiz : Key
4.5.1 - Endpoint - Protocol &s; Email Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Heartbleed	Quiz : Key
4.1.2 - Wireless Devices	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Wireless Jamming	Quiz : Key
2.3.1 - Application Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Race Conditions
Case Study - iPhone Integer Overflow	Quiz : Key
2.4.11 - Application Attacks Part 1	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Directory Traversal
Lab - Privilege Escalation
Lab - Pass the Hash	Quiz : Key
2.4.12 - Application Attacks Part 2	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Buffer Overflow
Lab - Command Injection
Lab - Intro CSRF
Lab - CSRF Application
Case Study - Chrome Crash Catastrophe	Quiz : Key
4.1.4 - Application Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.3.2 - OS and Web-based Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - SQL Injection DVWA
Lab - SQL Injection Juice Shop
Lab - XSS DVWA
Lab - XSS Juice Shop	Quiz : Key
4.5.2 - Endpoint - OS &s; Monitoring	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.3.3 - Hardware and Virtualization Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - VENOM Vulnerability	Quiz : Key
2.3.4 - Supply Chain, Zero-day, and Cryptographic Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Zero Day Attack	Quiz : Key
4.1.3 - Mobile Solutions	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Geolocation	Quiz : Key
2.4.7 - Physical Attacks	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.2.3 - Physical Security	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 4 - Cryptographic Solutions
Unit 4 Lesson Plan

1.4.2 - Encryption	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Linux Personal File Encryption
Lab - Windows 7 Personal File Encryption	Quiz : Key
1.4.4 - Obfuscation and Steganography	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Obfuscation
Lab - Steganography
Case Study - Steganography	Quiz : Key
1.4.5 - Hashing, Digital Signatures, and Blockchain	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.4.1 - Public Key Infrastructure	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.4.6 - Certificates	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Certificates	Quiz : Key
1.4.3 - Cryptographic Tools	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.4.13 - Cryptographic Attack	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Collision	Quiz : Key
 	 	 	 	 
Unit 5 - Vulnerability Analysis &s; Remediation
Unit 5 Lesson Plan

4.3.1 - Identifying Vulnerabilities	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - ip-ifconfig
Case Study - Pen Testing	Quiz : Key
5.5.2 - Pentesting	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Bug Bounty	Quiz : Key
4.4.1 - Monitoring Resources	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.4.2 - Monitoring Tools	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Wireshark
Lab - tcpdump	Quiz : Key
1.2.4 - Deception and Disruption Technology	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Honeypot	Quiz : Key
4.3.2 - Vulnerability Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 6 - Security Controls
Unit 6 Lesson Plan

1.1.1 - Security Controls	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.1.2 - Architecture Considerations	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.1 - Infrastructure Considerations	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.5.2 - Hardening Techniques	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Backdoor Removal
Lab - RAT Removal
Lab - Backdoor Shortcut	Quiz : Key
4.5.3 - Endpoint - Firewall, IDS/IPS &s; Web Filter	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.2 - Network Appliances	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
2.5.1 - Mitigation Techniques	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.2.3 - Secure Communication/Access and Effective Controls	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - NordVPN Hack	Quiz : Key
 	 	 	 	 
Unit 7 - Data Management
Unit 7 Lesson Plan

3.3.1 - Data Classification and Types	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Handling Sensitive Data	Quiz : Key
3.3.2 - Data Sovereignty and Protection	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - File Hashing	Quiz : Key
3.4.1 - Resilience and Recovery I	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
3.4.2 - Resilience and Recovery II	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 8 - Infrastructure &s; SecOps
Unit 8 Lesson Plan

3.1.1 - Architecture and Infrastructure Concepts	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Specialized Systems Vulnerabilities	Quiz : Key
4.1.1 - Hardening Targets and Secure Baselines	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Exposure Through Cloud Misconfiguration	Quiz : Key
4.6.1 - Access Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Quantum Cryptography	Quiz : Key
4.7.1 - Scripting and Automation	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
 	 	 	 	 
Unit 9 - Incident Response
Unit 9 Lesson Plan

2.4.15 - Indicators of Malicious Activity	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Equifax	Quiz : Key
4.8.1 - Incident Response	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Cuckoo
Case Study - Incident Response	Quiz : Key
4.9.1 - Logs	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Metadata	Quiz : Key
 	 	 	 	 
Unit 10 - Processes &s; Governance
Unit 10 Lesson Plan

1.2.2 - Gap Analysis and Zero Trust	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.1 - Business Processes	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.2 - Technical Implications of Change Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
1.3.3 - Documentation and Version Control of Change Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
4.2.1 - Data Asset Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Data Sanitization
Case Study - Data Destruction	Quiz : Key
5.1.1 - Security Governance	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - The GDPR	Quiz : Key
 	 	 	 	 
Unit 11 - Risk, Audits &s; Compliance
Unit 11 Lesson Plan

5.2.1 - Risk Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Case Study - Failure to Disclose	Quiz : Key
5.3.1 - Third-Party Vendors	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
5.4.1 - Security Compliance	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
5.5.1 - Audits and Attestation	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key