Cybersecurity 1b

Defense Against Threats

Unmask the cybersecurity threats around you by understanding hackers and identifying weaknesses in your online behavior. Learn to avoid the various types of cyberattacks, including those to your social media accounts, and to predict the potential legal consequences of sharing or accessing information that you do not have rights to. Dig into these crimes in depth by taking a look at cyber forensics and other cybersecurity careers. Cybersecurity will play an increasingly larger role in our personal and professional lives in the years to come.

 

Required Materials

  • Slide-show presentation program
  • Word processing program

Software: Wireshark: https://www.wireshark.org/#download

In order to run Wireshark on your machine, you need:

  • Hard disk: USB memory stick (Recommended to be at least 4 gigs)
  • Memory: 2+GB RAM
  • Supported Operating System: Windows, Mac OS X

Software: Virtual Box: https://www.virtualbox.org/wiki/downloads

In order to run VirtualBox on your machine, you need:

  • CPU: Recent Intel or AMD processor
  • Memory: 2+GB RAM
  • Hard disk: About 4GB free hard disk space
  • Supported Operating System: Windows, Mac OS X, Linux, Solaris and OpenSolaris.

Other Materials:

  • USB memory stick (Recommended to be at least 4 GB)

Optional: (The following materials will only be needed if student chooses to do some activities/labs by hand.)

  • Printer
  • Blank paper (a variety of sizes)
  • Markers, crayons, pens, pencils