Cyber Basics - Module 1: Introduction to Cybersecurity and Virtualization
This module is the introductory module for the Cyber Basics course (aka GenCyber). In the first lesson, it provides a very high-level and basic overview of cybersecurity. During the remaining lessons, it walks the student through hands-on installation of virtualization software and a Linux operating system on a virtual machine (VM). Additionally, the student is exposed to, and gains confidence using, rudimentary Linux commands and tasks. At the end of this module, the student should have a basic understanding of cybersecurity and the skills to install and use virtualization software. This module prepares the student for follow-on modules in the Cyber Basics course.
- Define cyberspace and cybersecurity
- Understand the basic security principles of confidentiality, integrity, and availability
- Describe common threats to information security
- Understand basic security fundamentals
- Install virtualization software and a Linux operating system on a computer
- Understand Linux and Windows user interfaces
- Apply Linux and Windows commands to run programs and do basic file manipulation
Faculty may question why lesson 2 is provided in this course/module at all when the Virginia Cyber Range provides a virtual environment in which the students can access Linux and Windows VMs already. In fact, lesson 2 could be omitted and lessons 3 and 4 could be taught using the VM resources on the Virginia Cyber Range; however, lesson 2 will give the student (and teacher) and understanding and appreciation of virtualization. It also gives a student a stand-alone Linux environment that they can experiment with any time, without having to log into Virginia Cyber Range resources. Most of the exercises in this course cannot be completed with this stand-alone VM but require Virginia Cyber Range access.
After this module and during subsequent hands-on in-class (or assigned homework) exercises, it is highly recommended students use the Virginia Cyber Range virtual environment. Of course, faculty may opt to have students use the VMs installed during lesson 2. There are pros and cons for either option.
- K0004: * Knowledge of cybersecurity principles.
- K0044: Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- K0111: Knowledge of common network tools (e.g., ping, traceroute, nslookup) and interpret the information results.
- K0129: Knowledge of Unix command line (e.g., mkdir, mv, ls, passwd, grep).
- K0130: Knowledge of virtualization technologies and virtual machine development and maintenance.
- K0211: Knowledge of confidentiality, integrity, and availability requirements.
- K0224: Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.
- K0295: Knowledge of confidentiality, integrity, and availability principles.
- K0307: Knowledge of common network tools (e.g., ping, traceroute, nslookup).
- K0537: Knowledge of system administration concepts for the Unix/Linux and Windows operating systems (e.g., process management, directory structure, installed applications, Access Controls).
- K0609: Knowledge of virtual machine technologies.
- K0610: Knowledge of virtualization products (VMware, Virtual PC).
- S0006: Skill in applying confidentiality, integrity, and availability principles.
- S0073: Skill in using virtual machines.
- A0055: Ability to operate common network tools (e.g., ping, traceroute, nslookup).
- IA Fundamentals
- Virtualization Technologies