“Oodles of fun ahead” – Someone Famous (2016)
After Lesson 2 Activity 1, you’ll be able to:
- identify different IT environments you have exposure to and answer some basic questions about them.
After Lesson 2 Activity 2, you’ll be able to:
- compare and contrast different IT environments you’ve come across (particularly home and school.)
After Lesson 3 Activity 1, you’ll be able to:
- identify the major hardware components of a computer;
- describe what virtual computing is as well as two current applications.
After Lesson 3 Activity 2, you’ll be able to:
- describe and create your own version of a client-server model;
- identify at least 2 advantages and disadvantages of this model type.
After Lesson 4 Activity 1, you’ll be able to:
- compare and contrast hardware computing and virtual computing;
- justify the purpose of virtual computing;
- identify various downfalls of virtualization.
After Lesson 5 Activity 1, you’ll be able to:
- successfully connect to a VM in separate ways;
- gain an understanding of these different connection methods.
After Lesson 5 Activity 2, you’ll be able to:
- compare and contrast the two types of connects discussed previously.
After Lesson 6 Activity 1, you’ll be able to:
- successfully install your own Windows OS.
After Lesson 6 Activity 2, you’ll be able to:
- successfully install your own Ubuntu OS;
- use command line instructions to traverse, create, modify, and delete files.
After Lesson 7 Activity 1, you’ll be able to:
- create a diagram showing the concept of tunneling;
- justify the purpose of tunneling;
- discuss the idea behind using a NAT and how this relates to public and private address spaces;
- implement the above to ensure an understanding of packet forwarding.
After Lesson 7 Activity 2, you’ll be able to:
- identify the purpose and limitations of a firewall;
- implement a fully functional firewall;
- accurately place your firewall into your network hierarchy.
After Lesson 8 Activity 1, you’ll be able to:
- gain and understanding of what a DNS server is and how it works;
- create a basic DNS record for your own DNS server.
After Lesson 8 Activity 2, you’ll be able to:
- change DNS records to allow for mail routing;
- gain an understanding of mail architecture;
- setup up your own mail architecture.
After Lesson 8 Activity 3, you’ll be able to:
- gain a better understanding of file shares;
- configure an NFS share;
- mount a file share;
- use SFTP to transfer files to and from a server.
After Lesson 8 Activity 4, you’ll be able to:
- set up a basic web server accessible to the internal network;
- create a basic web page.
After Lesson 9 Activity 1, you’ll be able to:
- identify at least 2 common networking issues and outline how to
diagnose and fix those issues; - utilize various networking analysis tools and use them to help
determine potential networking problems.
After Lesson 9 Activity 2, you’ll be able to:
- successfully install your own Kali Linux OS;
- use and describe how the vulnerability scanners operate, as well as decide when it is appropriate to use each.
After Lesson 10 Activity 1, you ‘ll be able to:
- list the potential risks of various every day activities in a typical business;
- apply what you’ve learned to your own life and make connections to the risks that you may face.
After Lesson 10 Activity 2, you’ll be able to:
- list the pros and cons of collocating services;
- apply your thinking to your own life and make a decision on which occasions it is more advantageous to use these services.
After Lesson 11 Activity 1, you’ll be able to:
- perform basic hardening of your Windows VMs;
- understand the limitations of hardened Windows systems and why these limitations exist.
After Lesson 11 Activity 2, you’ll be able to:
- perform basic hardening of your Unix VMs;
- understand the limitations of hardened Unix systems and why these limitations exist.
After Lesson 12 Activity 1, you’ll be able to:
- describe at least two aspects of the hardening process for a DNS server;
- describe the limitations of hardening a DNS server, as well as the costs associated with doing so.
After Lesson 12 Activity 2, you’ll be able to:
- describe at least two aspects of the hardening process for mail servers;
- describe the limitations of hardening a mail server, as well as the costs associated with doing so.
After Lesson 13 Activity 1, you’ll be able to:
- discuss the importance of perimeter monitoring systems;
- implement your own network monitoring system;
- identify various network activities in Wireshark logs.
After Lesson 13 Activity 2, you’ll be able to:
- discuss how your previous mail server was insecure;
- create a flowchart showing how SSL certificates work;
- implement your own SSL certificates in order to secure a mail server.
After Lesson 14 Activity 1, you’ll be able to:
- analyze and gain useful information from logs.
After Lesson 15 Activity 1, you’ll be able to:
- create a plan of action for when a security breach occurs.
After Lesson 16 Activity 1, you’ll be able to:
- analyze a sample CDC scenario and be able to identify:
- potential weaknesses;
- all services needed;
- what is given and what needs to be built from scratch;
- a timeline for working.
After Lesson 16 Activity 2, you’ll be able to:
- identify your individual weak points in knowledge for the upcoming challenge;
- list out specific points of attack;
- brainstorm several possible solutions to each of these weak points.