Cybersecurity (OLD)

  • File Hashing Exercise

    1. Using the Hashcalc software
    2. Comparing hash results
    3. Comparing different hashing algorithms
  • Hashing Algorithm Research

    1. When certain algorithms were created
    2. How many bits they use
    3. Which construction they use
  • Quiz 1

    1. Types of attacks
    2. Methods of defending against attackers
    3. Cybersecurity terminology
  • Quiz 2

    1. Laws pertaining to cybersecurity
    2. States of data
    3. More cybersecurity terminology
  • Quiz 3

    1. Types of malware
    2. Methods used by hackers
    3. Computer vulnerabilities
  • Google Data Centre / Security Key

    1. How Google protects customer data
    2. How to use 2-step verification
    3. How to check your Gmail account for attackers
  • Symmetric/Asymmetric Examples

    1. How both types of algorithms work 2. Specific symmetric encryption algorithms 3. Specific asymmetric encryption algorithms
  • Cipher Chart

    1. How vigenere tables work 2. Creating our own vigenere table 3. Making our own encrypted message with our vigenere table
  • Creating a Cyber World

    1. How computer networks work 2. Using Packet Tracer 3. Different features and processes of networks
  • Server Services

    Ftp Server: Allows users to share and exchange data. Web Server: Processes and delivers webpages to users. Email Server: Stores and distributes virtual mail. DNS Server: Converts domain names to IP addresses so users can access internet resources. NTP Server: Keeps track of real-world time. AAA Server: Identifies users, determines their permissions and keeps track of their resources.
  • Communicating in a Cyber World

    Communicating in a Cyber World

    1. Making use of different servers 2. How computers communicate 3. Sending/Receiving files
  • Exploring Encyption

    Exploring Encyption

    1. The uses of encryption 2. Ways to decrypt encrypted data 3. Sending and receiving E-mails
  • File and Integrity Check

    File and Integrity Check

    1. How to deal with tampered data 2. The uses of hashing 3. Checking encrypted data
  • WEP WPA2 PSK WPA2 RADIUS

    WEP WPA2 PSK WPA2 RADIUS

    1. Different types of wireless connections 2. How to set up wireless connections 3. How to improve network security

Looking for a timeline maker?

Create timelines for projects, roadmaps, history, lessons, legal cases, and stories with Timetoast. Timetoast is a timeline maker for work, school, research, and stories.