Toggle navigation
SY110 - Introduction to Cyber Security
Digital Data: Bits & Bytes + Files
Options
Print
Class
1 - Introduction
2 - Hardware: Computer Architecture
3 - Pillars of Cyber Security
4 - Risk & Software Install
5 - Digital Data: Bits & Bytes + Files
6 - Operating Systems: Basics & File Systems
7 - Operating Systems: Windows Shell & Permissions
8 - Operating Systems: Remote Access & UNIX Shell
9 - Programs: Statements & Variables
10 - Programs: Input & Output
11 - Programs: Conditionals & Loops
12 - Networking: Intro & Physical Layer
13 - Networking: Data Link Layer
14 - Networking: Network & Transport Layers
15 - Networking: Application Layer
16 - Networking: Wireless
17 - The Web & HTML
18 - Client Side Scripting: Non-Event Driven & Event Driven
19 - HTML Forms
20 - Server Side Scripting
21 - Injection Attacks & XSS
22 - Firewalls
23 - Symmetric Encryption
24 - Hashing & Password Activity
25 - Asymmetric Encryption
26 - Digital Cryptography Tools and Applications
27 - Digital Forensics
28 - Cyber Recon
29 - Malware
30 - Cyber Attack
31 - Cyber Defense
32 - Cyber Domain Case Studies & Course Wrap Up
Lab
1 - PC Dissection Lab
2 - Build-a-LAN Lab
3 - Build-a-WLAN Lab
4 - Build-a-Web-Site Lab
5 - Digital Certificates Lab
6 - Digital Forensics Lab
7 - Cyber Recon Lab
8 - Cyber Attack Lab
9 - Cyber Defense Lab
There are 10 kinds of people in this world.
Those that understand binary.
Those that don't.
Bits & Bytes
Files
Useful links for today's class:
Bare ASCII table
Hex Conversion Table
Right click & Save
hello.txt
to your desktop.
Right click & Save
CSL.png
to your desktop.
A Binary Counter
A Hex Counter
Right click & Save
A Random JPG
to your desktop.
Right click & Save
A (harmless) Virus
to your desktop.
Right click & Save
A (Not very) 'Dangerous' JPG
to your desktop.
File Inspection Activity