CodePath

Intro to Cybersecurity

Project Description


Codepath CYB101: Introduction to Cybersecurity is a comprehensive course that introduces essential cybersecurity concepts and tools. It covers system basics like Linux commands, SSH, RDP, and PKI, and delves into access control with password hashing. Networking fundamentals include IP and DNS exploits, with practical pen-testing using Metasploit. The course explores malware classification and detection, data security through metadata and steganography, and social engineering tactics like phishing and spoofing with tools such as the Social Engineering Toolkit (SET). Privacy topics discuss security versus anonymity, equipping students with a foundational understanding of cybersecurity challenges.

Unit 1

What I learned in Unit 1

  • How to build a security mindset
  • CIA Triad - Confidentiality, Integrity, and Availability
  • Cybersecurity assets: Company, People, Information, Technology, Facility
  • Vulnerabilities, Threats and Risks
  • Types of threat actors
  • Control Functions & Types
  • Honeypots and Incident Response Plan
  • NIST Framework
  • CyberChef & Solving CTFs
  • Unit 2

    What I learned in Unit 2

  • Operating a VM - Ubuntu
  • Unix commands such as: sudo, ssh, pwd, ls, cd, cd..
  • Navigating a filesystem
  • Moving files from one directory to another via terminal
  • Creating, using, authenticating & encrypting SSH keys
  • Git configuring & signing
  • Ciphers such as Caesar cipher, ROT-1
  • Hashing, hashing algos (SHA-256), pepper/salt values
  • Private/public keys
  • SSL protocol, certificates, TLS handshake
  • Unit 3

    What I learned in Unit 3

  • John the ripper password cracker
  • Using/writing John commands
  • Device indentities such as Zero Trust
  • Three factors of authentication
  • Types of authentication (2FA, MFA)
  • Unix file permissions
  • Password encryption
  • Unit 4

    What I learned in Unit 4

  • Linux folder structure & commands such as dig
  • Hosts file in Linux & roles such as nano
  • Spoofing a website with a fake IP address
  • Using nmap & metasploit framework
  • Using the vsftpd backdoor exploit
  • How routers, firewalls, load balancers
  • MAC addresses, Address Resolution Protocol (ARP), DNS
  • DNS resolution, DHCP, local DNS, ISP DNS, root DNS
  • Border Gateway Protocol, Network Instrusion Detection
  • Blackhole routing, Rate limiting, Traffic scrubbing
  • Unit 5

    What I learned in Unit 5

  • How to use VirusTotal & EICAR Anti-Virus files
  • Using vt-cli tools
  • Viruses, Worms, Trojan horses, Ransomware
  • Types of antivirus software
  • Malware signatures
  • Process isolation, VMs
  • Forensic artifacts & tools such as Wireshark
  • Unit 6

    What I learned in Unit 6

  • Using Cyberchef to look at Metadata
  • Hex values, Frame Tasks, Steganography
  • 3 States of Data: Rest, Motion, Use
  • Data exfiltration
  • HIPPA, COPPA, FERPA Data Laws
  • Data Loss Prevention Techniques
  • Using steghide to embed messages into images
  • Unit 7

    What I learned in Unit 7

  • How to use Shodan
  • Writing python scripts to get JSON data using Shodan API
  • OSINT (Open source Intelligence)
  • Threat Intelligence: Analysis of actors's motives & targets
  • Levels of Threat Intelligence
  • Strategic, Tactical & Operational OSINT
  • Sources of OSINT
  • Unit 8

    Capstone Project

    PHI$H TANK

    Milestone 1
  • Drafting a plan for completing the project
  • Project plan: Phising Attacks
  • Design & Visualize the presentation
  • Gather reputable sources and data
  • Unit 9

    Capstone Project

    PHI$H TANK

    Milestone 2
  • Worked on presentation
  • Complete any research and add details
  • Ensure presentation is polished
  • Conduct a team review
  • Unit 10

    Capstone Project

    PHI$H TANK

    Demo Day
    Projects