In this fourth module of the Introduction to Cybersecurity for High School Students and K12 Educators course, the lessons will describe the steps an attacker would take when attacking a computing infrastructure. The module covers the first 2 steps in the 4-step process including: reconnaissance and exploits. Students will work on the Kali Linux box associated with the course in the Virginia Cyber Range.
This is the second module in the Cyber-Physical Industry course; however, it can be taught as a standalone module. The purpose of this module is to introduce students to the current concept of critical infrastructure, the sectors of the economy that are currently managed as critical infrastructure, and the vision for how critical infrastructure will evolve as “smart cities” grow and develop.
The goal of this course is to provide a basic and broad overview of cybersecurity, helping the student to understand correct and safe online behavior and increase their interest in cybersecurity and careers in the cybersecurity workforce. In this course, we will explore various cybersecurity topics to include networking and network security tools, cryptography (ciphers, keys, digital signatures, hashes, encryption protocols, etc.), hacking basics (network reconnaissance and scanning, password cracking, and exploiting web application vulnerabilities), and the legal and eth
This is the 0 module in the Cyber Basics course (aka GenCyber). This module contains a collection of introductory hands-on Linux labs for students to become familiar with the Linux OS as well as many of the tools used in cybersecurity.
This module is the introductory module for the Cyber Basics course (aka GenCyber). In the first lesson, it provides a very high-level and basic overview of cybersecurity. During the remaining lessons, it walks the student through hands-on installation of virtualization software and a Linux operating system on a virtual machine (VM). Additionally, the student is exposed to, and gains confidence using, rudimentary Linux commands and tasks. At the end of this module, the student should have a basic understanding of cybersecurity and the skills to inst
This is the second module in the Cyber Basics course (aka GenCyber). It provides basic definitions related to networking (NIC, LAN, WAN, WAP, internet, etc.) and describes basic network devices. It explains the pros/cons between wired and wireless network topographies. It also gives a brief overview and history of the global internet.
This is the third module in the Cyber Basics course (aka GenCyber). It begins by providing the student with a bit of the evolution of cryptography and cryptographic systems, exposing them to several cipher techniques. We then look at basic threats to confidentiality and explain how cryptography can help to ensure confidentiality, discussing the cryptography process and symmetric versus asymmetric cryptography. The module introduces the student to several critical pieces and parts of modern cryptography to include cryptographic algorithms, cryptograp
This is the fourth module in the Cyber Basics course (aka GenCyber). This module familiarizes the student with techniques for passive and active network reconnaissance to include sweeping, scanning, OS finger printing, banner grabbing, war-dialing and war-driving. It then looks at how passwords are stored (hashes) and how attacks on user password hashes are carried out. During the password cracking lesson, the students actually get some hands-on experience with a free, open source password cracking tool. Finally, the module moves on to how web serv
This is the fifth module in the Cyber Basics course (aka GenCyber). This module stimulates discussion and gets students thinking about the importance of ethical behavior when engaging in cybersecurity activities. It looks at Acceptable Use Policies, various case studies, and existing codes of ethics/conduct in industry today. It also presents the student with several recent case studies on cybersecurity activities (national and international) and allows them to explore and discuss the legal, ethical and privacy considerations of each case.
This is the sixth and final module in the Cyber Basics course (aka GenCyber). This module is a resource and reference for high school teachers (or other educators) using parts or all of the material from the Cyber Basics course. These are tools and resources that can assist the teacher in getting students excited about and engaged in cyber education. It discusses several topics to include starting a cybersecurity “hacking” club, cybersecurity competitions, getting guest speakers in the field of cybersecurity, Hacker Con events, the Maker Movement, a