Foundation of Cybersecurity
*********
*********
Due Date: August 23, 2023
Sign into Code HS. 
Click here. https://codehs.com/login
Use your Klien ISD signon and password.

Complete the following.

 


*********
*********

curriculum outline below: https://cyber.instructure.com/courses/243

	
Course Content
Unit 1 - Foundations and Threats
Unit 1 Assessment

Section 0.1 - First Day Info &s; Ethics Agreement
Lesson Plan
0.1.1 - First Day Info &s; Ethics Agreement	Lesson Guide
PowerPoint	Activity - Course Interest Survey
Ethics Agreement
Section 1.1 - CIA Triad and Authentication
Lesson Plan
1.1.1 - Intro to Security Concepts	Lesson Guide
PowerPoint	Activity - Understanding the CIA Triad
Activity - Understanding the CIA Triad Answers
Activity - CIA Triad Card Game
Activity - CIA Triad Card Game Answers
1.1.2 - Authentication	Lesson Guide
PowerPoint	Activity - Testing Password Strength
Activity - Safe Password Poster Instructions
Activity - Creating a Safe Password
1.1.3 - Authentication and Password Attacks	Lesson Guide
PowerPoint	Activity - Have you been Pwned?
1.1.4 - Password Hashing	Lesson Guide
PowerPoint	Activity - Hashing &s; Salts with Cyber Chef
Activity - Our Rainbow Table spreadsheet
Activity - NIST Password Guidelines Worksheet
Activity - NIST Guidelines Article 1
Activity - NIST Guidelines Article 2
1.1.5 - Methods of Authentication	Lesson Guide
PowerPoint	Activity - Which Authentication
Activity - Which Authentication Samples Answers
Activity - Extension - Biometric Authentication Product Pitch
Section 1.2 - Identifying Security Threats
Lesson Plan
1.2.1 - Malicious Code - Part 1	Lesson Guide
PowerPoint	Activity - Historic Malware - Teacher
Activity - Historic Malware - Student
Activity - Historic Malware - Reference Articles
Activity - Historic Malware Template
Activity - Malware Notes Sheet
1.2.2 - Malicious Code - Part 2	Lesson Guide
PowerPoint	
Section 1.3 - Intro to CLI (Command Line Interface)
Lesson Plan
1.3.1 - Virtualization	Lesson Guide
PowerPoint	Lab - Online Virtual Machine Access
Lab - Online Virtual Machine Access PPT
1.3.2 - Command Line Interface - Linux	Lesson Guide
PowerPoint	Lab - Terminus Part 1
Lab - Terminus Part 1 Answers
Lab - Terminus Part 1 Map
Lab - Terminus Part 1 PPT
Lab - Password Cracking with John the Ripper
Lab - Password Cracking with John the Ripper Answers
Lab - Password Cracking with John the Ripper PPT
Linux Commands Reference Sheet
Lab - Extension - Windows CLI
Lab - Extension - Windows CLI PPT
 	 	 
Unit 2 - Human Factor
Unit 2 - Assessment

Section 2.1 - Social Engineering
Lesson Plan
2.1.1 - Social Engineering	Lesson Guide
PowerPoint	Activity - 7 Steps of Hacking
Activity - 7 Steps of Hacking Answers
Activity - Extension - Social Engineering PSA Video Project
Activity - Extension - Social Engineering PSA Video Project Rubric
Lab - Social Engineering Toolkit
Lab - Social Engineering Toolkit PPT
Section 2.2 - Phishing and OSINT
Lesson Plan
2.2.1 - Phishing	Lesson Guide
PowerPoint	
2.2.2 - OSINT	Lesson Guide
PowerPoint	Activity - OSINT Report on Tony Stark
Activity - OSINT Report on Tony Stark Answers
2.2.3 - Phishing Myself Project		Activity - Phishing Myself
Activity - Phishing Myself Product Template
Activity - Phishing Myself Rubric
2.2.4 - Mitigating the Human Risk	Lesson Guide
PowerPoint	Activity - SANS Clean Desk Policy
Activity - SANS Clean Desk Policy Answers
 	 	 
Unit 3 - Data Safety &s; Best Practices
Unit 3 - Assessment

Section 3.1 - Securing the System
Lesson Plan
3.1.1 - System Vulnerabilities	Lesson Guide
PowerPoint	Activity - CVE Named Vulnerabilities
Activity - CVE Named Vulnerabilities Answer Key
3.1.2 - System Hardening Part 1	Lesson Guide
PowerPoint	Lab - MBSA Vulnerability Scan
Lab - MBSA Vulnerability Scan Answer Key
Lab - MBSA Vulnerability Scan PPT
Activity - Extension - Benchmark Selections Project
Activity - Extension - CIS Microsoft Windows 10 Benchmark Reference
3.1.3 - System Hardening Part 2	Lesson Guide
PowerPoint	Activity - Bingo Teacher Instructions
Activity - Bingo Game Securing the System PPT
Activity - Bingo Blank Sheets
Activity - Bingo Prefilled Cards
Section 3.2 - IoT Threat Modeling
Lesson Plan
3.2.1 - Threat Modeling &s; IOT	Lesson Guide
PowerPoint	Activity - IoT Spoons Game Teacher Instructions
Activity - IoT Spoons Game
Activity - My IoT Threat Model
 	 	 
Unit 4 - Cryptography &s; Linux
Unit 4 - Assessment

Section 4.1 - Bit, Binary, &s; Encoding
Lesson Plan
4.1.1 - Bits, Bytes, and Binary	Lesson Guide
PowerPoint	Activity - Binary Magic Cards
Activity - Binary Magic Cards Instructions
Activity - Binary to Decimal Worksheet
Activity - Binary to Decimal Worksheet Answers
4.1.2 - Hexadecimal Numbers	Lesson Guide
PowerPoint	ASCII Chart Handout
4.1.3 - Encoding	Lesson Guide
PowerPoint	Activity - CTF Introduction
Activity - Extension - Encoding on Mars PPT
Activity - Extension - Article: Encoding on Mars
Lab - Decoding with CTF Challenges
Lab - Decoding with CTF Challenges Answers
Lab - Decoding with CTF Challenges PPT
Section 4.2 - Cryptography Basics Concepts
Lesson Plan
4.2.1 - Cryptography Basic Concepts	Lesson Guide
PowerPoint	Activity - Breaking Ciphers
Activity - Breaking Ciphers Answers
Activity - Vigenere Try It Teacher
Activity - Optional Scavenger Hunt Instructions
Activity - Optional Scavenger Hunt Clues
Activity - Optional Scavenger Hunt Handout
4.2.2 - Steganography	Lesson Guide
PowerPoint	Lab - Steganography CTF
Lab - Steganography CTF Answers
Lab - Steganography PPT
Section 4.3 - Advanced Linux CLI
Lesson Plan
4.3.1 - Advanced Linux CLI	Lesson Guide
PowerPoint	Lab - Terminus Part 2
Lab - Terminus Part 2 Answers
Lab - Terminus Part 2 PPT
Lab - Searching Files with Grep
Lab - Searching Files with Grep Answers
Lab - Searching Files with Grep PPT
4.3.2 - Scripting	Lesson Guide
PowerPoint	Lab - Scripting in Linux
Lab - Scripting in Linux Answers
Lab - Scripting in Linux PPT
Section 4.4 - Privacy vs Security
Lesson Plan
4.4.1 - Privacy vs Security Debate		Activity - Debate Instructions
Activity - Debate Rubric
Activity - Debate Instructor Resources
Activity - Debate Privacy Resources
Activity - Debate Security Resources
 	 	 
Unit 5 - Devices &s; Networks
Unit 5 - Assessment

Section 5.1 - Computer Components
Lesson Plan
5.1.1 - Computer Components	Lesson Guide
PowerPoint	Lab - Installing PC Components
Lab - Installing PC Components PPT
Section 5.2 - Networking Fundamentals
Lesson Plan
5.2.1 - Network Connections	Lesson Guide
PowerPoint	Activity - Net Puzzles
Activity - Net Puzzles Answers
5.2.2 - Network Naming	Lesson Guide
PowerPoint	Lab - ARP with Wireshark
Lab - ARP with Wireshark Answers
Lab - ARP with Wireshark PPT
Section 5.3 - Protocols &s; Packets
Lesson Plan
5.3.1 - Communicating in a Network	Lesson Guide
PowerPoint	Activity - Mobster Net Instructions
Tags - Do Not Deliver
Tags - Deliver
5.3.2 - Packet Delivery &s; Protocols	Lesson Guide
PowerPoint	Lab - Instructor PPT - Packet Analysis with Wireshark
Lab - Teacher Notes - Packet Analysis with Wireshark
Lab - Packet Analysis with Wireshark Student Worksheet
Lab - Packet Analysis with Wireshark Answers
 	 	 
Unit 6 - Law &s; Ethics
Unit 6 - Assessment

Section 6.1 - Law &s; Ethics
Lesson Plan
6.1.1 - Law &s; Ethics	Lesson Guide
PowerPoint	Activity - Cyber Crime and Punishment Poster
Activity - Cyber Crime and Punishment Poster Instructions
Activity - Ethics Agreement
Activity - US Laws on Cybercrimes
Activity - Crime Articles zipped folder
 	 	 
Unit 7 - Reconnaissance
Unit 7 - Assessment

Section 7.1 - Recon Intro and Google Dorking
Lesson Plan
7.1.1 - Intro and Google Dorking	Lesson Guide
PowerPoint	Activity - Recon with Google Dorks
Activity - Recon with Google Dorks Answers
Section 7.2 - WHOIS and Nslookup
Lesson Plan
7.2.1 - Recon with WHOIS	Lesson Guide
PowerPoint	Lab - Recon with WHOIS
Lab - Recon with WHOIS Answers
Lab - Recon with WHOIS PPT
7.2.2 - Recon with Nslookup	Lesson Guide
PowerPoint	Lab - Using Nslookup
Lab - Using Nslookup Answers
Lab - Using Nslookup PPT
Section 7.3 - Network Scanning
Lesson Plan
7.3.1 - IP Address &s; Subnet Masks	Lesson Guide
PowerPoint	Activity - Infection Detection Instructions
Activity - Infection Detection Print IP Addresses
Activity - Infection Detection PrintSwitch Net IDs
7.3.2 - Recon with Scanning	Lesson Guide
PowerPoint	Lab - Nmap &s; Zenmap Scanning
Lab - Nmap &s; Zenmap Scanning Answers
Lab - Nmap &s; Zenmap Scanning PPT
 	 	 
Unit 8 - Network &s; System Threats
Unit 8 - Assessment

Section 8.1 - Net Attacks DoS
Lesson Plan
8.1.1 - CLI for Networking	Lesson Guide
PowerPoint	Lab - CLI for Networking
Lab - CLI for Networking Answers
Lab - CLI for Networking PPT
8.1.2 - DoS Attacks	Lesson Guide
PowerPoint	Lab - SYN Flood DoS Attack
Lab - SYN Flood DoS Attack Answers
Lab - SYN Flood DoS Attack PPT
Section 8.2 - Spoofing &s; Sniffing
Lesson Plan
8.2.1 - Spoofing &s; Sniffing	Lesson Guide
PowerPoint	Lab - ARP Spoofing for DoS &s; AiTM Attacks
Lab - ARP Spoofing for DoS &s; AiTM Attacks Answers
Lab - ARP Spoofing for DoS &s; AiTM Attacks PPT
Section 8.3 - Wireless, Mobile, &s; VPNs
Lesson Plan
8.3.1 - Wireless, Mobile, &s; VPNs	Lesson Guide
PowerPoint	Lab - SSH Tunneling for Privacy
Lab - SSH Tunneling for Privacy PPT
Section 8.4 - Pentesting &s; Exploits
Lesson Plan
8.4.1 - Pentesting &s; Exploits	Lesson Guide
PowerPoint	Lab - Exploring Metasploit
Lab - Exploring Metasploit Answers
Lab - Exploring Metasploit PPT
8.4.2 - Attack Scenario	Lesson Guide
PowerPoint	Lab - Exfiltration with MimiKatz
Lab - Exfiltration wtih MimiKatz Answers
Lab - Exfiltration with MimiKatz PPT
Lab - Post-Exploitation
Lab - Post-Exploitation Answers
Lab - Post-Exploitation PPT
8.4.3 - Threat Hunting Tools	Lesson Guide
PowerPoint	Lab - Hunting a BackDoor
Lab - Hunting a BackDoor PPT
Section 8.5 - Cyber War
Lesson Plan
8.5.1 - Cyber Weapons	Lesson Guide
PowerPoint	Activity - Trial of EternalBlue Project Instructions
Activity - Trial of EternalBlue Project Timeline Infographic
Activity - Trial of EternalBlue Project Sandworm Resources
Activity - Trial of EternalBlue Project North Korea Resources
Activity - Trial of EternalBlue Project Brokers Resources
Activity - Trial of EternalBlue Project NSA Resources
 	 	 
Unit 9 - Securing Online Components
Unit 9 - Assessment

Section 9.1 - Basic Web Concepts
Lesson Plan
9.1.1 - Web Basics	Lesson Guide
PowerPoint	Lab - Exploring Developers Tool
Lab - Exploring Developers Tool PPT
Section 9.2 - Web Vulnerabilities
Lesson Plan
9.2.1 - Web Vulnerabilities	Lesson Guide
PowerPoint	Lab - Cookie Manipulation
Lab - Cooking Manipulation PPT
9.2.2 - User Input Threats	Lesson Guide
PowerPoint	Lab - Command Injection &s; XSS
Lab - Command Injection &s; XSS PPT
Section 9.3 - Databases and SQL Injection
Lesson Plan
9.3.1 - Databases and SQL Injection	Lesson Guide
PowerPoint	Lab - Basic SQL Commands
Lab - Basic SQL Commands Answers
Lab - Basic SQL Commands PPT
Lab - Exploring SQL Injection
Lab - Exploring SQL Injection PPT
 	 	 
Unit 10 - Encryption Security Tools
Unit 10 - Assessment

Section 10.1 - Symmetric and Asymmetric Encryption
Lesson Plan
10.1.1 - Symmetric Encryption	Lesson Guide
PowerPoint	Activity - Creating a Key Exchange
10.1.2 - Asymmetric Encryption	Lesson Guide
PowerPoint	Activity - Investigating RSA Keypairs
Section 10.2 - SSL for Online Security
Lesson Plan
10.2.1 - SSL for Online Security	Lesson Guide
PowerPoint	Lab - Decrypting SSL
Lab - Decrypting SSL Answers
Lab - Decrypting SSL PPT