This is the first module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course. The purpose of this module is to introduce students to trends and challenges in cyber threats. The material is approached from the perspective of what are examples of cyber threats, how are they impacting on cyber security and how are we responding.
The purpose of this module is to introduce students to the use of Kali Linux to perform a penetration test against a target system in a controlled lab environment. The material is approached from the perspective of what an actual penetration tester would do in a real-life penetration testing scenario.
This is the fourth and final module in the Cyber-Physical Industry course; however, it can be taught as a standalone module. The purpose of this module is to introduce students to physical and cognitive ergonomics (human factors), and explain why this discipline is so critical for cybersecurity management. The lessons relate musculoskeletal, metabolic, environmental, and cognitive aspects of performance to contextual risk.
This module covers the first stage of an attack. Reconnaissance is the stage where an attacker will gather as much information as possible about their target before they exploit a system. Much of the module will cover OSINT or open source intelligence. Topics include passive and active footprinting, competitive intelligence gathering, whois/rdap lookups, website cloning, and email tracking and harvesting.
This is the first module in the Introduction to Cybersecurity for High School Students and K12 Educators course. It addresses the following: