Please enable JavaScript to use CodeHS

Advanced Cybersecurity

Description

This lesson is an introduction to network attacks. Students review how data is transmitted over the internet and learn how attacks occur by exploiting vulnerabilities in open ports.

Objective

Students will be able to:

  • Define vulnerability and exploits
  • Explain the role of open ports in a network attack
  • Explain how a network scan can help identify vulnerabilities
Description

In this lesson, students learn about the different types of malware as well as how to detect, prevent, and remove malware. Students learn how anti-malware software works and explore various tools different operating systems have to detect and prevent malware.

Objective

Students will be able to:

  • Explain how to prevent and remove malware using the following tools and methods: antivirus/anti-malware software, recovery console, backup/restore, and view running processes
  • Define malware and identify different types of malware: ransomware, trojan, keylogger, rootkit, virus, worm, spyware
Description

In this lesson, students learn about social engineering and how it is used in cyber attacks. Students also learn what DoS and DDoS attacks are and how they use internet protocols to overwhelm a network.

Objective

Students will be able to:

  • Explain what social engineering is and how it can be leveraged to attack a network
  • Explain how DoS and DDoS attacks work and their impact a network
Description

In this lesson, students learn about additional common cyber attacks, such as zero day attacks, botnet attacks, rainbow table attacks and man-in-the-middle attacks. Students will explore famous cyber attacks (3ve, Mirai, and Stuxnet) and reflect on what we can learn from past attacks to strengthen present network security.

Objective

Students will be able to:

  • Identify common social engineering attacks: dumpster diving, phishing, and impersonation/tailgating
  • Explain how the following cyber attacks work: zero-day, man-in-the-middle, rainbow table, brute force, dictionary, zombie, spoofing
Description

In this lesson, students will learn about and discuss cross-site scripting (XSS), which is another major OWASP (Open Web Application Security Project) cybersecurity risk.

Objective

Students will be able to:

  • Explain what XSS is, how it works, and what kind of damage can occur from an XSS attack
  • Understand the fundamentals of how XSS attacks are prevented or at least mitigated
Description

In this lesson, students learn about how to increase the security of a network by keeping individual, physical devices secure. Students learn about best practices for ensuring only authorized users log into a device as well as consider how user permissions and data loss prevention (DLP) can ensure sensitive data remains secure.

Objective

Students will be able to:

  • Explain how the principle of least privilege relates to account management
  • Describe best practices for setting strong passwords and using passwords in a variety of settings, such as setting a BIOS/UEFI password and a screensaver password