Intro to Cyber
Attacks, Concepts and Techniques
Protect You Data and Privacy
Protecting the Organization
Will Your Future be in Cyber?
100

Any information about you, including your name, social security number, driver license number, date and place of birth, your mother’s maiden name, and even pictures

What is personally identifiable information (PII)?

100

This type of attack takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files. 

What are Rootkits?

100

A preset network identifier that may or may not be broadcast.

What is a Service Set Identifier (SSID)?

100

This system uses a set of traffic signatures that match and block malicious traffic and attacks.

What are Intrusion Prevention Systems?

100

These define the laws that Cybersecurity professionals and individuals must follow.

What are Legal Issues?

200

A large network of physical objects, such as sensors, software and other equipment.

What are IoT devices?

200

The most common goal of this is to increase traffic to malicious sites that may host malware or attempt social engineering.

What is Search Engine Optimization poisoning (SEO)?

200

This organization published improved password requirements that are intended to be used for government applications

Who is the National Institute of Standards and Technologies (NIST)?

200

In networking, each application running on a device is assigned an identifier called this.

What are Port Numbers?

200

Moral principles that govern a person's behavior or the conducting of an activity.

What are Ethical Issues?

300

These are the foundational principles for protecting information.

What are confidentiality, integrity, and availability?

300

This uses a large dictionary of precomputed hashes and the passwords from which they were calculated to crack passwords. 

What is a Rainbow attack?

300

A Windows system that can be used to encrypt files.

What is the Encrypting File System (EFS)?

300

Doing this can let you knowing and understanding the value of what you are protecting will help to justify security expenditures.

What are Risk Assessments?

300

This is an entry-level certification and what you will earn from completing this course.

What is Cisco Certified Support Technician (CCST) Cybersecurity?

400

This attacker’s job is to identify weaknesses in a company’s computer system.

What is a White Hat Hacker?

400

This is the process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file.

What are Access Controls?

400

SDelete, Shred, and Secure Empty Trash are all examples of applications that do this.

What is destroying data by overwriting?

400

A form of threat detection that involves looking for anomalies in the flow of communication between a user on the local network and a local or remote destination.

What is Behavior-Based Security?

400

This is the highest professional certification that Mr. Wetzel has.

What is the CompTIA Security+ certification?

500

This can include confidential documents, trade secrets and patents that an organization or individual holds.

What is Intellectual Property?

500

This is a multi-phase, long term, stealthy and complex operation against a specific target. 

What are Advanced Persistent Threats?

500

These are the three primary sections of a Terms of Service agreement.

What are Data Use Policy, Privacy Settings, and Security Policy?

500

Filters communications based on the user, device, role, application type and threat profile (like at school).

What are Context aware layer firewalls?

500

This is the career in Cybersecurity that Mr. Wetzel will work in (if I ever stop teaching).

What is a Penetration Testers?

M
e
n
u