Please enable JavaScript to use CodeHS

Advanced Cybersecurity

Description

This lesson introduces students to the Advanced Cybersecurity course, with the goal of getting students invested in and excited about the content. Students will explore the wide variety of pathways in the cybersecurity field and will learn about the role cryptography plays in keeping networks and data secure.

Objective

Students will be able to:

  • Explain the importance of cybersecurity in the current landscape
  • Explore the multitude of cybersecurity careers and pathways, their requirements, and job projections
  • Set goals for the course
Description

In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process. Students will also learn about the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard).

Objective

Students will be able to:

  • Explain the characteristics of symmetric algorithms and use them to encode and decode text. Specific ciphers include block, substitution, and transposition ciphers.
  • Compare and contrast the strengths and weaknesses of symmetric ciphers.
  • Compare and contrast the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard).
Description

In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.

Objective

Students will be able to:

  • Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics

  • Explain the difference between symmetric and asymmetric encryption

Description

In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.

Objective

Students will be able to:

  • Identify what a hashing algorithm is and its related vocabulary, such as digest and collisions
  • Describe what makes an ideal hashing algorithm and why they are important in encryption and cybersecurity overall
  • Describe how malicious actors try to crack hashing algorithms
Description

In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.

Objective

Students will be able to:

  • Solve simple modulo problems
  • Explain why modulo math is useful in hashing algorithms and protecting data in cybersecurity
Description

In this lesson, students learn how asymmetric encryption uses public and private keys to encrypt data and they learn how the RSA algorithm addresses the security issue of key authentication. Students also explore different examples of asymmetric encryption algorithms and evaluate them to determine what aspects make an algorithm strong.

Objective

Students will be able to:

  • Explain how asymmetric encryption uses a public and private key to encrypt data
  • Explain how the RSA algorithm addresses security vulnerabilities
  • Evaluate asymmetric encryption algorithms to determine what characteristics make an algorithm strong
Description

In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security.

Objective

Students will be able to:

  • Explain the role of SSL certificates in internet security
  • Explain how certificates work, including how to obtain one, their relationship with public and private keys, and how the chain of trust is used to create trust additional checks of authenticity
  • Explain how stapling and pinning strengthen the security of a certificate
Description

In this lesson, students review content with a 15 question Unit Quiz.

Objective

Students will be able to:

  • Demonstrate their understanding of advanced cryptography topics
Description

In this project, students will learn about steganography and how it is used to encrypt data. Students will develop their own encryption algorithm to hide a message in an image by manipulating the hexadecimal color codes of an image.

Objective

Students will be able to:

  • Define steganography and explain how it is used in cryptography
  • Use steganography to encrypt a message in an image by manipulating the hexadecimal color code of pixels
Description

In this lesson, students will build upon their foundational knowledge of networks to learn about advanced network devices. Students will delve into devices that enable communication and data sharing, such as servers and load balancers, as well as devices that increase network security, such as firewalls, IDP, IPD, and UTM. In sum, students will understand how complex networks use a variety of devices, each playing an important role in the functionality and security of the network.

Objective

Students will be able to:

  • Explain the purpose of advanced networking devices: load balancer, IDP/IPD, and UTM appliance
  • Describe the role of a variety of server types: web, file, DNS, printer, mail, and authentication
  • Explain how a network is configured using multiple devices and how each device plays an important role in the functionality and security of the network
Description

In this lesson, students will learn about the importance of physical security as well as environmental controls. Students will understand that the security and functionality of a network goes beyond simply having the necessary devices - it includes proper security and maintenance of the devices.

Objective
  • Explain the importance of specific security measures: mantrap, door lock, biometric locks, USB locks, privacy screen
  • Explain environmental impacts on devices and implement appropriate controls
Description

In this lesson, students will learn about the many protocols and standards that are used to send and receive information across a network. Students will learn how networks use specific ports and protocols, each with a specific purpose, such as sending and receiving emails. Students will also learn about wireless networking standards and how frequency and channels relate to speed of data transmission.

Objective

Students will be able to:

  • Compare and contrast wireless networking protocols: 802.11.a 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ax
  • Compare and contrast TCP and UDP protocols
  • Explain how networks use ports and protocols, each with a specific purpose. Ports reviewed include 21, 22, 23, 25, 53, 80, 110, 143, and 443
  • Explain how wireless standards use frequencies and channels to transmit data
Description

In this lesson, students will build on their knowledge of networks and consider how to ensure the perimeter of a network is secure. Students will learn about different devices that can be used to secure a company’s intranet from the internet as well as ways to enable remote access to the intranet.

Objective

Students will be able to:

  • Secure a basic wireless network using multiple devices: DMZ, NAT, MAC filtering, firewall
  • Identify different network topologies
  • Explain the difference between the intranet and the internet
  • Explain how VPNs can be used to remotely access a company’s intranet
Description

In this lesson, students will extend their understanding of securing a network to include securing mobile devices. Students will learn about best practices for mobile device security as well as how BYOD (bring your own device) policies have impacted a company’s network security.

Objective

Students will be able to:

  • Explain methods for securing mobile devices
  • Define BYOD policy and MDM tools and evaluate their effectiveness
  • Evaluate the use of biometric authentication to unlock phones through the lens of privacy
Description

At this point, students have a strong understanding of how different devices can be used to configure a secure network. In this lesson, students will learn how access controls and the AAA protocol (authentication, authorization, and accounting) can be used to ensure only authorized personnel access a network.

Objective

Students will be able to:

  • Define access control and explain how it is used in relation to network security
  • Define the AAA (authentication, authorization, accounting) protocol and explain how each relates to network security
  • Explain how multi-factor authentication increases network security
Description

In this lesson, students review content with a 20 question Unit Quiz.

Objective

Students will be able to:

  • Demonstrate their understanding of advanced networking devices
Description

In this lesson, students explore what it means to be a cybersecurity professional. Students learn about a wide variety of cybersecurity careers, what each job entails, and what skills sets are needed to be successful. Students learn about the importance of communication and practice responding to a customer support call.

Objective

Students will be able to:

  • Explore skill sets and duties of multiple cybersecurity careers
  • Describe the skills involved in successful customer support
  • Utilize customer support and communication skills in a mock customer support call
Description

In this lesson, students continue to develop their customer service skills by writing a knowledge base article. Students will research a common network issue and create an article that effectively details the steps to resolve it. Students will also go through a peer review process as a way to practice giving and receiving feedback.

Objective

Students will be able to:

  • Explain the purpose of a knowledge base and describe the characteristics of an effective knowledge base article
  • Effectively provide instructions for how to troubleshoot a common network issue
Description

In this lesson, students learn about the planning and recording process of making an instructional video. Students will create their own video by first planning the topic and audience as well as writing a script and storyboard. Students will then learn how to record and edit their video.

Objective

Students will be able to:

  • Explain the role videos play in supporting customers and clients
  • Describe the characteristics of an effective instructional video
  • Develop a plan for an instructional video, including identifying the topic and audience, writing a script, and developing a storyboard
  • Record and edit an instructional video
Description

This lesson is an introduction to network attacks. Students review how data is transmitted over the internet and learn how attacks occur by exploiting vulnerabilities in open ports.

Objective

Students will be able to:

  • Define vulnerability and exploits
  • Explain the role of open ports in a network attack
  • Explain how a network scan can help identify vulnerabilities
Description

In this lesson, students learn about the different types of malware as well as how to detect, prevent, and remove malware. Students learn how anti-malware software works and explore various tools different operating systems have to detect and prevent malware.

Objective

Students will be able to:

  • Explain how to prevent and remove malware using the following tools and methods: antivirus/anti-malware software, recovery console, backup/restore, and view running processes
  • Define malware and identify different types of malware: ransomware, trojan, keylogger, rootkit, virus, worm, spyware
Description

In this lesson, students learn about social engineering and how it is used in cyber attacks. Students also learn what DoS and DDoS attacks are and how they use internet protocols to overwhelm a network.

Objective

Students will be able to:

  • Explain what social engineering is and how it can be leveraged to attack a network
  • Explain how DoS and DDoS attacks work and their impact a network
Description

In this lesson, students learn about additional common cyber attacks, such as zero day attacks, botnet attacks, rainbow table attacks and man-in-the-middle attacks. Students will explore famous cyber attacks (3ve, Mirai, and Stuxnet) and reflect on what we can learn from past attacks to strengthen present network security.

Objective

Students will be able to:

  • Identify common social engineering attacks: dumpster diving, phishing, and impersonation/tailgating
  • Explain how the following cyber attacks work: zero-day, man-in-the-middle, rainbow table, brute force, dictionary, zombie, spoofing
Description

In this lesson, students will learn about and discuss cross-site scripting (XSS), which is another major OWASP (Open Web Application Security Project) cybersecurity risk.

Objective

Students will be able to:

  • Explain what XSS is, how it works, and what kind of damage can occur from an XSS attack
  • Understand the fundamentals of how XSS attacks are prevented or at least mitigated
Description

In this lesson, students learn about how to increase the security of a network by keeping individual, physical devices secure. Students learn about best practices for ensuring only authorized users log into a device as well as consider how user permissions and data loss prevention (DLP) can ensure sensitive data remains secure.

Objective

Students will be able to:

  • Explain how the principle of least privilege relates to account management
  • Describe best practices for setting strong passwords and using passwords in a variety of settings, such as setting a BIOS/UEFI password and a screensaver password
Description

In this portion of the project, students will come up with a fictitious company and feel the impact of reacting to a security breach without any pre-developed policy in place. Students will then learn about some of the common policies companies put in place and set forth on the task of developing strong policies for their company.

Objective

Students will be able to:

  • Reflect on why policy documentation is important for security
  • Identify examples of policy documentation
Description

Incident response plans are essential to ensure that companies are prepared to effectively respond to any breach in security. In this portion of the project, students will develop a set of policies regarding strong passwords and employee training. They will test their policies against a series of employee negligence scenarios and reflect on what would need to be added to strengthen their policy.

Objective

Students will be able to:

  • Develop a set of policies regarding strong passwords and employee training
  • Reflect on the strength of policy documentation
Description

In this portion of the project, students will create an abbreviated Incident Response plan. They will respond to a cyber attack using their IR plan and reflect on how they were able to handle this attack as well as how to strengthen their policy.

Objective

Students will be able to:

  • Develop an incident response plan
  • Reflect on the strength of policy documentation
Description

Data can be one of a company’s most valuable resources, not to mention most regulated. Developing a strong plan for keeping data secure is essential, especially as more and more companies turn to the cloud to keep track of the massive amounts of data that are being collected every day. In this portion of the project, students will review an example privacy policy and then complete their own abbreviated policy. They will test their data policies against a data breach and reflect on what would need to be added to strengthen their policy.

Objective

Students will be able to:

  • Develop a data privacy policy
  • Reflect on the strength of policy documentation
Description

Change management is the approach to preparing and supporting individuals and/or teams to successfully adopt organizational change. When implementing changes within a company, it is essential to consider how you will present the change to employees and support them in adopting and implementing the change. In this portion of the project, students will synthesize the changes that need to be made to strengthen their policies. They will develop a change management plan to implement new policies effectively.

Objective

Students will be able to:

  • Develop a change management plan
Description

In this lesson, students are introduced to the concept of risk assessment, and students learn about the role of vulnerability scans in detecting weaknesses. Students also learn about honeypots and packet sniffing and explore how these tools can be used to detect vulnerabilities and improve the security of a network.

Objective

Students will be able to:

  • Explain how vulnerability scans can improve network security
  • Define risk assessment and explain its role in network security
  • Explain how tools such as honeypots and packet sniffing can improve the security of a network
Description

In this lesson, students will identify, assess, and prioritize risks based on their potential impacts. Students will utilize prior knowledge to connect to the concept of prioritizing risks. They will learn new types of vulnerabilities such as input and error handling.

Objective

Students will be able to:

  • Identify risks such as race conditions, input and error handling, and buffer and integer overflow
  • Use a vulnerability scan and database to identify potential impacts and suggestedrisk mitigation
Description

In this lesson, students continue to deepen their understanding of risk assessment. Students learn how to prioritize and respond to different threats by calculating risk, both quantitatively and qualitatively.

Objective

Students will be able to:

  • Compare and contrast quantitative risk assessments and qualitative risk assessments as well as consider the challenges associated with each
  • Calculate risk using the formula SLE * ARO = ALE
  • Explain the different ways to respond to risk: avoidance, transfer, mitigation, and acceptance
Description

In this lesson, students learn about penetration testing and how pen tests extend vulnerability scans by attempting to exploit weaknesses in addition to finding them. Students have the opportunity to engage in a pen test simulation as well as learn about the next evolution of pen testing, chaos engineering.

Objective

Students will be able to:

  • Define penetration testing and describe the steps involved
Description

In this project, students will design and create a board game or a card game that will help players to identify randomized security vulnerabilities and their appropriate defenses.

Objective

Students will be able to:

  • Brainstorm and create a risk management game
  • Create a prototype
  • Test with a focus group