This lesson introduces students to the Advanced Cybersecurity course, with the goal of getting students invested in and excited about the content. Students will explore the wide variety of pathways in the cybersecurity field and will learn about the role cryptography plays in keeping networks and data secure.
Students will be able to:
In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process. Students will also learn about the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard).
Students will be able to:
In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.
Students will be able to:
Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics
Explain the difference between symmetric and asymmetric encryption
In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.
Students will be able to:
In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.
Students will be able to:
In this lesson, students learn how asymmetric encryption uses public and private keys to encrypt data and they learn how the RSA algorithm addresses the security issue of key authentication. Students also explore different examples of asymmetric encryption algorithms and evaluate them to determine what aspects make an algorithm strong.
Students will be able to:
In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security.
Students will be able to:
In this lesson, students review content with a 15 question Unit Quiz.
Students will be able to: