Cyber Rangers
-
course overview
Syllabus | Cyber Rangers -
Zoom Links1 Topic
-
Module 1: Welcome to the Cyber SquadMorphing into a Cyber Ranger3 Topics
-
Whatβs in the Digital World?3 Topics
-
Cyber Threats: Meet the Villains3 Topics
-
The Cyber Defense Arsenal3 Topics
-
The Art of the Hack3 Topics
-
CTF: The First Mission2 Topics
-
Red Ranger β Network Defender (Sessions 7-10)The Power of Firewalls3 Topics
-
DDoS Attacks: When Too Much is Too Bad3 Topics
-
Wi-Fi Security: Is Your Home Network Safe?3 Topics
-
CTF Challenge β Network Defense
-
Blue Ranger β Cryptography Expert (Sessions 11-14)2048 Game - Understanding Code Logic3 Topics
-
The Secret Language of Codes
-
Modern Encryption: How Does It Work?
-
Breaking the Code: Ethical Decryption
-
CTF Challenge β Cryptography
-
Yellow Ranger β Ethical Hacker (Sessions 15-18)Hacking for Good: The Role of Ethical Hackers
-
Social Engineering: Trick or Treat?
-
Web App Hacking: Finding Weak Spots
-
CTF Challenge β Ethical Hacking
-
Green Ranger β Threat Hunter (Sessions 19-20)Becoming a Threat Hunter
-
CTF Challenge β Threat Hunting
-
Module 3: Cyber Crisis SimulationsIncident Response: Save the Cityβs Power Grid!
-
Data Breach Mystery: Find the Insider
-
Ransomware Attack: Pay or Fight?
-
Module 4: The Cyber Rangers Final BattleMega CTF Tournament
-
Final Mission: Defend Cyber City
-
Cyber Ranger Graduation
-
Where to Next? Exploring Cybersecurity Careers
-
Optional Content & Enrichment (10 Extra Sessions)Geographical Mapping
-
Red Team vs. Blue Team
-
Advanced Forensics
-
OSINT Challenges
-
Spy Games
-
Lockpicking 101 (Virtual)
-
Defusing a Virtual Bomb
-
AI in Cybersecurity
-
Create Your Own CTF Challenge
-
Internet of Things (IoT) Hacking
-
Cyber Rangers Hall of Fame
Participants 9
Lesson Companion – What is in the Digital World?
Cyber School 21/08/2025
π§Ύ Cyber Rangers β Module 1, Session 2
Lesson Companion: Whatβs in the Digital World?
Student Notes & Thinking Journal
π― What Youβll Learn Today
- How devices connect through networks
- What the internet really is and how it works
- What happens when you send a message online
- How hackers can intercept that data β and how we defend it
π Notes by Topic
Use the space below to take notes while watching the presentation and participating in class.
π What Is a Network?
π A network is…
π Devices in my home network include:
π What Is the Internet?
π The internet is made up of…
π It works by…
π¦ What Are Data Packets?
π When I send a message, it gets…
π Each packet has:
β A piece of the message
β The destination IP address
β The sender’s IP address
π§ IP Address
π My IP address is like…
π IP addresses help computers…
π DNS β Domain Name System
π DNS is important because…
π Example:
google.com β _______________
π‘ Routers and Switches
π Routers help…
π Switches connect…
π Threats in the Network
π Hackers can use tools to:
β Intercept traffic
β Read unencrypted messages
β Trick DNS systems
π The danger is…
π How Cyber Rangers Defend the Network
π Some tools and techniques we use include:
β Encryption
β Traffic monitoring
β DNS validation
β Using secure websites (https)
π‘ Key Terms to Remember
Term | What It Means |
---|---|
Network | ________________________________ |
Internet | ________________________________ |
Packet | ________________________________ |
IP Address | ________________________________ |
Router | ________________________________ |
DNS | ________________________________ |
π§ Lab Preview β What to Expect
Todayβs lab is about mapping a network using a simulator.
Youβll:
- Build a small virtual network
- Connect 2 computers, a router, and a switch
- Watch how data travels between them
π What I think the lab will look like:
π¬ Reflection
- What part of todayβs session was new or surprising to you?
π ________________________________________________________
π ________________________________________________________ - What do you want to explore more about the internet?
π ________________________________________________________
π ________________________________________________________ - Whatβs one way hackers could misuse this technology β and how would you stop it?
π ________________________________________________________
π ________________________________________________________