​Topics in Cyber Education
  • Home
  • Teaching Cybersecurity
  • Tech Competitions
  • About & Contact

teaching    Cybersecurity

General Resources
  • ​Galantech Cybersecurity Syllabus
  • Security Interactives -  short animations on a series of cybersecurity topics, created by a group of cybersecurity college professors and subject matter experts.
  • Infosec Infographics - good explanations of advanced topics like DNS Poisoning.  Perfect for making into posters​​
  • ​Clark Center - a repository of cybersecurity curriculum, labs and activities compiled by Towson University through an NSA grant. 

1 Network Concepts  - to secure something you need to know how it works.  Start here to get the basics of how networks deal with data.
  • Linux Terminal Commands -Terminus game - A game to learn Linux terminal commands. Loosely based on the old Zork game, the student has to use Linux commands in a terminal interface to find their way through an adventure land. 
    Worksheets and supporting docs:   Student Worksheet           Teacher Answer Key         Terminus Map
  • Protocols, Packets and Wireshark - this activity provides students with 3 packet captures and a worksheet.  Students use the Wireshark application to find the answers in the packet captures.  Covers simple concepts like ARP,  the 3-way handshake, identifying MAC and IP addresses, protocols with port numbers and Wireshark techniques like Follow TCP. 
    Student Worksheet    Teacher Answer Key     Packet Captures (3)
  • Security Interactives - animated mini-lessons
    • ​​​OSI Model           3-Way Handshake           Addressing (IP + MAC + NAT)
  • ​The Cuckoo's Egg Decompiled Online Course - The Cuckoo's Egg (by Cliff Stoll) is an iconic book about tracking a hacker spy through the early pre-Internet networks. Chris Sanders is an infosec researcher and trainer - he ran an online book club to discuss how the events in The Cuckoo's Egg are reflected in current digital hacking events. Delivered in 7 one hour video lectures with fun labs and demos to follow along. You can learn most of what you need to know about network security through this course!​ ​
2  Introduction to Security Concepts
  • ​Intro lesson /discussion (download lesson) - In 2012, Wired reporter Mat Honan was attacked by a hacker who destroyed all of Mat’s data including the only photos he had of his infant daughter. The article describes the hack as it happens and then Mat’s interaction with the hacker to find out how he did it – and why. Students read Mat Honan’s Epic Hack article and research online the August 2019 hack of Twitter CEO Jack Dorsey’s account using a SIM swapping hack. Discuss as a class – use as a baseline sharing of what students perceive as cybersecurity risks, what safeguards are out there, how they handle their own device and account security.
3  Social Engineering
  • ​Security Interactives - animated mini-lesson on Social Engineering categories​​
4  Reconnaissance
  • ​Security Interactives - animated mini-lesson on Google Hacking (Dorking) 
5  Identifying Security Threats
  • Security Interactives - animated mini-lessons
    • ​​Spoofing Attack          Buffer Overflow          Stuxnet
6 Cryptography
  • Security Interactives - animated mini-lessons
    • ​Symmetric vs Asymmetric vs Digital Signature          Cryptocurrency          Public Key Infrastructure (PKI)
  • Cracking Codes with Python textbook https://inventwithpython.com/cracking/  - teaches complete beginners how to program in the Python programming language.  The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative & affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography. 
  • The Code Book (Free) - Simon Sing - fascinating read on the history and workings of cryptography and The Cipher Challenge -  a set of ten encrypted messages found at the end of The Code Book when it was first published. It took over a year for all of the challenges to be solved - see how far you can get, then read the solutions/explanations on the website.
7 Hardening System and Networks
8 Defensive Tools and Techniques
9 Securing Online Communications
  • Security Interactives - animated mini-lessons
    • ​​SQL Injection          XSS (Cross Site Scripting)          Code Injection  plus Quiz
    • Heartbleed             MeltDown & Spectre
  • The Tangled Web book - Michal Zalewski - "A Guide to Securing Modern Web Applications". Very readable take on how the web works from a security perspective. Good explanation of how browsers and the web are vulnerable.
10 Wireless and Mobile Security
  • Mobile Tracking from Apps and Social Media - short lesson PPT slides + an activity for students to view how their own phone tracks their geographical movements.  
11 Legal + Ethics + Policies
  • Future Crimes book and TED Talk - Mark Goodman - career in law enforcement, including work as Futurist with the FBI, Senior Advisor to Interpol and street police officer. He addresses how everything is now connected which creates beneficial technologies but also opportunities for criminals.
12 Programming & Cybersecurity 
Reading Recommendations
  • Home
  • Teaching Cybersecurity
  • Tech Competitions
  • About & Contact