For Students

“Oodles of fun ahead” – Someone Famous (2016)

After Lesson 2 Activity 1, you’ll be able to:

  • identify different IT environments you have exposure to and answer some basic questions about them.

 

After Lesson 2 Activity 2, you’ll be able to:

  • compare and contrast different IT environments you’ve come across (particularly home and school.)

 

After Lesson 3 Activity 1, you’ll be able to:

  • identify the major hardware components of a computer;
  • describe what virtual computing is as well as two current applications.

 

After Lesson 3 Activity 2, you’ll be able to:

  • describe and create your own version of a client-server model;
  • identify at least 2 advantages and disadvantages of this model type.

 

After Lesson 4 Activity 1, you’ll be able to:

  • compare and contrast hardware computing and virtual computing;
  • justify the purpose of virtual computing;
  • identify various downfalls of virtualization.

 

After Lesson 5 Activity 1, you’ll be able to:

  • successfully connect to a VM in separate ways;
  • gain an understanding of these different connection methods.

 

After Lesson 5 Activity 2, you’ll be able to:

  • compare and contrast the two types of connects discussed previously.

 

After Lesson 6 Activity 1, you’ll be able to:

  • successfully install your own Windows OS.

 

After Lesson 6 Activity 2, you’ll be able to:

  • successfully install your own Ubuntu OS;
  • use command line instructions to traverse, create, modify, and delete files.

 

After Lesson 7 Activity 1, you’ll be able to:

  • create a diagram showing the concept of tunneling;
  • justify the purpose of tunneling;
  • discuss the idea behind using a NAT and how this relates to public and private address spaces;
  • implement the above to ensure an understanding of packet forwarding.

 

After Lesson 7 Activity 2, you’ll be able to:

  • identify the purpose and limitations of a firewall;
  • implement a fully functional firewall;
  • accurately place your firewall into your network hierarchy.

 

After Lesson 8 Activity 1, you’ll be able to:

  • gain and understanding of what a DNS server is and how it works;
  • create a basic DNS record for your own DNS server.

 

After Lesson 8 Activity 2, you’ll be able to:

  • change DNS records to allow for mail routing;
  • gain an understanding of mail architecture;
  • setup up your own mail architecture.

 

After Lesson 8 Activity 3, you’ll be able to:

  • gain a better understanding of file shares;
  • configure an NFS share;
  • mount a file share;
  • use SFTP to transfer files to and from a server.

 

After Lesson 8 Activity 4, you’ll be able to:

  • set up a basic web server accessible to the internal network;
  • create a basic web page.

 

After Lesson 9 Activity 1, you’ll be able to:

  • identify at least 2 common networking issues and outline how to
    diagnose and fix those issues;
  • utilize various networking analysis tools and use them to help
    determine potential networking problems.

 

After Lesson 9 Activity 2, you’ll be able to:

  • successfully install your own Kali Linux OS;
  • use and describe how the vulnerability scanners operate, as well as decide when it is appropriate to use each.

 

After Lesson 10 Activity 1, you ‘ll be able to:

  • list the potential risks of various every day activities in a typical business;
  • apply what you’ve learned to your own life and make connections to the risks that you may face.

 

After Lesson 10 Activity 2, you’ll be able to:

  • list the pros and cons of collocating services;
  • apply your thinking to your own life and make a decision on which occasions it is more advantageous to use these services.

 

After Lesson 11 Activity 1, you’ll be able to:

  • perform basic hardening of your Windows VMs;
  • understand the limitations of hardened Windows systems and why these limitations exist.

 

After Lesson 11 Activity 2, you’ll be able to:

  • perform basic hardening of your Unix VMs;
  • understand the limitations of hardened Unix systems and why these limitations exist.

 

After Lesson 12 Activity 1, you’ll be able to:

  • describe at least two aspects of the hardening process for a DNS server;
  • describe the limitations of hardening a DNS server, as well as the costs associated with doing so.

 

After Lesson 12 Activity 2, you’ll be able to:

  • describe at least two aspects of the hardening process for mail servers;
  • describe the limitations of hardening a mail server, as well as the costs associated with doing so.

 

After Lesson 13 Activity 1, you’ll be able to:

  • discuss the importance of perimeter monitoring systems;
  • implement your own network monitoring system;
  • identify various network activities in Wireshark logs.

 

After Lesson 13 Activity 2, you’ll be able to:

  • discuss how your previous mail server was insecure;
  • create a flowchart showing how SSL certificates work;
  • implement your own SSL certificates in order to secure a mail server.

 

After Lesson 14 Activity 1, you’ll be able to:

  • analyze and gain useful information from logs.

 

After Lesson 15 Activity 1, you’ll be able to:

  • create a plan of action for when a security breach occurs.

 

After Lesson 16 Activity 1, you’ll be able to:

  • analyze a sample CDC scenario and be able to identify:
    • potential weaknesses;
    • all services needed;
    • what is given and what needs to be built from scratch;
    • a timeline for working.

 

After Lesson 16 Activity 2, you’ll be able to:

  • identify your individual weak points in knowledge for the upcoming challenge;
  • list out specific points of attack;
  • brainstorm several possible solutions to each of these weak points.