Skip to content

leaverossb/Cyber_Training

Repository files navigation

Cyber_Training

training portal for the cyber-impared or cyber-disadvantaged

Began on July 2018
Contributions:
Lead Developer - Phillip Ross
CSS and Initial Training Development - Sarah Fink (Morehead University)
Survey Data - Alexis Smith

Training Outline
0. What is a computer?
0.1. Parts:
0.1.1. RAM
0.1.2. Storage
0.1.3. CPU
0.1.4. Graphics Card
0.1.5. Mother Board
0.1.6. Power Supply
0.2. Computer Operations
0.2.1. BIOS
0.2.2. OS
0.2.3. Applications
0.2.4. User Interface (GUI)
0.3 Hardware v. Software Game

  1. Networks
    1.1. Network Basics
    1.1.1 What is a Network?
    1.1.1.0 History of the Internet
    1.1.1.1. LAN/WAN
    1.1.1.2. Network Hardware
    1.1.1.2.1 Router
    1.1.1.2.2. Cord matching game for wired routers
    1.1.1.2.3. Modem
    1.1.1.2.4. Internet
    1.1.2. Basic network building game

1.1.3. Larger Networks
1.1.3.1. Switches
1.1.3.2. Multiple computers
1.1.3.3. Wifi router
1.1.3.4. Printers, scanners, phones
1.1.3.5. Server
1.1.3.6. Advanced network building game

1.2. Router/Firewall
1.2.1. More detail on router
1.2.2. More detail on firewall
1.2.3. How they work together and are different
1.2.4. Firewall game

1.3. Advanced network
1.3.1. Larger network types/challenges
1.3.2. More detail on parts
1.3.3. Advanced network building game

2. Security and Privacy
2.1. Router Security
2.1.1. Router GUI
2.1.2. Change your Username/ Password
2.1.3. Become Invisible

2.2. Browser security
2.2.1. Browser settings
2.2.2. Cookie Control
2.2.3. Share Less Information

2.3. Password security
2.3.1. What Makes A Good Password
2.3.2. When To Change Passwords
2.3.3. How To Store Passwords

3. Hackers
3.1. Cyber kill chain
3.1.1. Reconnaissance
3.1.2. Network Scanning
3.1.3. Exploitation
3.1.4. Maintaining Access
3.1.5. Covering Your Tracks

3.2. Hackers TTPs
3.2.1. Brute Force Password Cracking
3.2.2. Phishing
3.2.3. Social Media Research
3.2.4. Try To Elevate Access Levels/ Privileges

3.3. Hacker Tools
3.3.1. Brute Force Password Cracking
3.3.2. Network Scanning
3.3.3. Locate Vulnerabilities and Exploit

4. Pull everything together games

About

Developing a training portal

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published