Cyber Rangers
-
course overview
Syllabus | Cyber Rangers -
Zoom Links1 Topic
-
Module 1: Welcome to the Cyber SquadMorphing into a Cyber Ranger3 Topics
-
Whatโs in the Digital World?3 Topics
-
Cyber Threats: Meet the Villains3 Topics
-
The Cyber Defense Arsenal3 Topics
-
The Art of the Hack3 Topics
-
CTF: The First Mission2 Topics
-
Red Ranger โ Network Defender (Sessions 7-10)The Power of Firewalls3 Topics
-
DDoS Attacks: When Too Much is Too Bad3 Topics
-
Wi-Fi Security: Is Your Home Network Safe?3 Topics
-
CTF Challenge โ Network Defense
-
Blue Ranger โ Cryptography Expert (Sessions 11-14)2048 Game - Understanding Code Logic3 Topics
-
The Secret Language of Codes3 Topics
-
Modern Encryption: How Does It Work?3 Topics
-
Breaking the Code: Ethical Decryption3 Topics
-
CTF Challenge โ Cryptography
-
Yellow Ranger โ Ethical Hacker (Sessions 15-18)Hacking for Good: The Role of Ethical Hackers4 Topics
-
Social Engineering: Trick or Treat?3 Topics
-
Web App Hacking: Finding Weak Spots4 Topics
-
Cross Site Scripting4 Topics
-
Green Ranger โ Breaking the codeCookies and Data4 Topics
-
CTF Challenge โ Javascript
-
Module 3: Cyber Crisis SimulationsIncident Response: Save the Cityโs Power Grid!3 Topics
-
Incident Response : Cyber Atack Unfolds3 Topics
-
Incident Response - Defend the Powergrid3 Topics
-
Incident Response : Lessons learned and report writing3 Topics
-
Understanding Data Breaches4 Topics
-
Looking for clues in a breach3 Topics
-
Data Breach Mystery: Find the Insider
-
Ransomware Attack: Pay or Fight?2 Topics
-
Module 4: The Cyber Rangers Final BattleMega CTF Tournament
-
Cyber Ranger Graduation
-
Where to Next? Exploring Cybersecurity Careers
-
Optional Content & Enrichment (10 Extra Sessions)Geographical Mapping
-
Red Team vs. Blue Team
-
Advanced Forensics
-
OSINT Challenges
-
Spy Games
-
Lockpicking 101 (Virtual)
-
Defusing a Virtual Bomb
-
AI in Cybersecurity
-
Create Your Own CTF Challenge
-
Internet of Things (IoT) Hacking
-
Cyber Rangers Hall of Fame
Participants 10
Lesson Companion: The Art of the Hack
How Hackers Break In โ and What We Can Learn From Them
๐ Use this guide to take notes, answer key questions, and reflect as you follow todayโs presentation and lab.
๐ฏ What I Will Learn Today
- The six stages of a real-world cyberattack
- How hackers think and what tools they use
- The difference between ethical and malicious hacking
- How to analyze websites for common security weaknesses
- Why itโs important to defend systems before they are attacked
๐ Notes by Topic
๐ง What Is Hacking?
Hacking originally meant:
๐ _______________________________________________________
Today, it often refers to:
๐ _______________________________________________________
Types of hackers:
| Type | Description |
|---|---|
| White Hat | ________________________________________ |
| Black Hat | ________________________________________ |
| Gray Hat | ________________________________________ |
๐ The Hackerโs Mindset
Hackers donโt try to break whatโs strong โ they look for whatโs:
๐ _______________________________________________________
They rely on:
- Logic and observation
- Weak security or human mistakes
- Tools that are easy to find online
๐ The 6-Stage Attack Chain
| Stage | What Happens |
|---|---|
| 1. Reconnaissance | _________________________________ |
| 2. Scanning | _________________________________ |
| 3. Access | _________________________________ |
| 4. Payload | _________________________________ |
| 5. Escalation | _________________________________ |
| 6. Exfiltration | _________________________________ |
๐งฐ Hacker Toolkit
Tools often used by attackers:
- Port scanners (e.g. Nmap)
- Password crackers (e.g. Hydra)
- Keyloggers
- Malware generators
- Social engineering kits
๐ Write one tool you learned about and what it does:
๐ Real-World Examples
Case 1: A student hacked the school gradebook
๐ What was the weak point? _____________________________
Case 2: Ransomware attack on a hospital
๐ How did it start? ____________________________________
๐ What was the damage? _______________________________
๐ Practice: Spot the Flaws
What are some common flaws hackers look for?
โ Weak passwords
โ Public data online
โ Open ports
โ Users who click links without checking
๐ Add one more weakness you learned about:
๐งช Lab Activity: โFind the Weak Linkโ
Goal: Use browser tools to inspect a challenge website and simulate a hackerโs early steps.
During the lab, I will:
โ Open Developer Tools (Inspect Element)
โ View HTML and JavaScript
โ Look for hidden fields, weak code, or exposed credentials
โ Try modifying inputs or checking script logic
โ Analyze how a real hacker might exploit this
๐ฌ Lab Reflection
๐ What was the most interesting thing you found?
๐ What made the site vulnerable?
๐ How could a developer fix it?
๐ก๏ธ Cyber Ethics
What makes a hacker ethical?
- Always has _________________________
- Works to ___________________________
- Never uses skills to ________________
โ Cyber Rangers use knowledge to protect โ not to harm.
๐ก Final Reflection
- What did you learn about how real hackers work?
๐ _____________________________________________________ - How does knowing this help you be a better defender?
๐ _____________________________________________________ - What will you look out for in your own digital life?
๐ _____________________________________________________