-
File Hashing Exercise
- Using the Hashcalc software
- Comparing hash results
- Comparing different hashing algorithms
-
Hashing Algorithm Research
- When certain algorithms were created
- How many bits they use
- Which construction they use
-
Quiz 1
- Types of attacks
- Methods of defending against attackers
- Cybersecurity terminology
-
Quiz 2
- Laws pertaining to cybersecurity
- States of data
- More cybersecurity terminology
-
Quiz 3
- Types of malware
- Methods used by hackers
- Computer vulnerabilities
-
Google Data Centre / Security Key
- How Google protects customer data
- How to use 2-step verification
- How to check your Gmail account for attackers
-
Symmetric/Asymmetric Examples
- How both types of algorithms work 2. Specific symmetric encryption algorithms 3. Specific asymmetric encryption algorithms
-
Cipher Chart
- How vigenere tables work 2. Creating our own vigenere table 3. Making our own encrypted message with our vigenere table
-
Creating a Cyber World
- How computer networks work 2. Using Packet Tracer 3. Different features and processes of networks
-
Server Services
Ftp Server: Allows users to share and exchange data. Web Server: Processes and delivers webpages to users. Email Server: Stores and distributes virtual mail. DNS Server: Converts domain names to IP addresses so users can access internet resources. NTP Server: Keeps track of real-world time. AAA Server: Identifies users, determines their permissions and keeps track of their resources. -
Communicating in a Cyber World
- Making use of different servers 2. How computers communicate 3. Sending/Receiving files
-
Exploring Encyption
- The uses of encryption 2. Ways to decrypt encrypted data 3. Sending and receiving E-mails
-
File and Integrity Check
- How to deal with tampered data 2. The uses of hashing 3. Checking encrypted data
-
WEP WPA2 PSK WPA2 RADIUS
- Different types of wireless connections 2. How to set up wireless connections 3. How to improve network security