Please enable JavaScript to use CodeHS

Advanced Cybersecurity

Description

In this lesson, students are introduced to the concept of risk assessment, and students learn about the role of vulnerability scans in detecting weaknesses. Students also learn about honeypots and packet sniffing and explore how these tools can be used to detect vulnerabilities and improve the security of a network.

Objective

Students will be able to:

  • Explain how vulnerability scans can improve network security
  • Define risk assessment and explain its role in network security
  • Explain how tools such as honeypots and packet sniffing can improve the security of a network
Description

In this lesson, students will identify, assess, and prioritize risks based on their potential impacts. Students will utilize prior knowledge to connect to the concept of prioritizing risks. They will learn new types of vulnerabilities such as input and error handling.

Objective

Students will be able to:

  • Identify risks such as race conditions, input and error handling, and buffer and integer overflow
  • Use a vulnerability scan and database to identify potential impacts and suggestedrisk mitigation
Description

In this lesson, students continue to deepen their understanding of risk assessment. Students learn how to prioritize and respond to different threats by calculating risk, both quantitatively and qualitatively.

Objective

Students will be able to:

  • Compare and contrast quantitative risk assessments and qualitative risk assessments as well as consider the challenges associated with each
  • Calculate risk using the formula SLE * ARO = ALE
  • Explain the different ways to respond to risk: avoidance, transfer, mitigation, and acceptance
Description

In this lesson, students learn about penetration testing and how pen tests extend vulnerability scans by attempting to exploit weaknesses in addition to finding them. Students have the opportunity to engage in a pen test simulation as well as learn about the next evolution of pen testing, chaos engineering.

Objective

Students will be able to:

  • Define penetration testing and describe the steps involved