Cybersecurity (OLD)

  • File Hashing Exercise

    1. Using the Hashcalc software
    2. Comparing hash results
    3. Comparing different hashing algorithms
  • Hashing Algorithm Research

    1. When certain algorithms were created
    2. How many bits they use
    3. Which construction they use
  • Quiz 1

    1. Types of attacks
    2. Methods of defending against attackers
    3. Cybersecurity terminology
  • Quiz 2

    1. Laws pertaining to cybersecurity
    2. States of data
    3. More cybersecurity terminology
  • Quiz 3

    1. Types of malware
    2. Methods used by hackers
    3. Computer vulnerabilities
  • Google Data Centre / Security Key

    1. How Google protects customer data
    2. How to use 2-step verification
    3. How to check your Gmail account for attackers
  • Symmetric/Asymmetric Examples

    1. How both types of algorithms work 2. Specific symmetric encryption algorithms 3. Specific asymmetric encryption algorithms
  • Cipher Chart

    1. How vigenere tables work 2. Creating our own vigenere table 3. Making our own encrypted message with our vigenere table
  • Creating a Cyber World

    1. How computer networks work 2. Using Packet Tracer 3. Different features and processes of networks
  • Server Services

    Ftp Server: Allows users to share and exchange data. Web Server: Processes and delivers webpages to users. Email Server: Stores and distributes virtual mail. DNS Server: Converts domain names to IP addresses so users can access internet resources. NTP Server: Keeps track of real-world time. AAA Server: Identifies users, determines their permissions and keeps track of their resources.
  • Communicating in a Cyber World

    Communicating in a Cyber World
    1. Making use of different servers 2. How computers communicate 3. Sending/Receiving files
  • Exploring Encyption

    Exploring Encyption
    1. The uses of encryption 2. Ways to decrypt encrypted data 3. Sending and receiving E-mails
  • File and Integrity Check

    File and Integrity Check
    1. How to deal with tampered data 2. The uses of hashing 3. Checking encrypted data
  • WEP WPA2 PSK WPA2 RADIUS

    WEP WPA2 PSK WPA2 RADIUS
    1. Different types of wireless connections 2. How to set up wireless connections 3. How to improve network security