Cyber Rangers
-
course overview
Syllabus | Cyber Rangers -
Zoom Links1 Topic
-
Module 1: Welcome to the Cyber SquadMorphing into a Cyber Ranger3 Topics
-
Whatβs in the Digital World?3 Topics
-
Cyber Threats: Meet the Villains3 Topics
-
The Cyber Defense Arsenal3 Topics
-
The Art of the Hack3 Topics
-
CTF: The First Mission2 Topics
-
Red Ranger β Network Defender (Sessions 7-10)The Power of Firewalls3 Topics
-
DDoS Attacks: When Too Much is Too Bad3 Topics
-
Wi-Fi Security: Is Your Home Network Safe?3 Topics
-
CTF Challenge β Network Defense
-
Blue Ranger β Cryptography Expert (Sessions 11-14)2048 Game - Understanding Code Logic3 Topics
-
The Secret Language of Codes3 Topics
-
Modern Encryption: How Does It Work?3 Topics
-
Breaking the Code: Ethical Decryption3 Topics
-
CTF Challenge β Cryptography
-
Yellow Ranger β Ethical Hacker (Sessions 15-18)Hacking for Good: The Role of Ethical Hackers4 Topics
-
Social Engineering: Trick or Treat?3 Topics
-
Web App Hacking: Finding Weak Spots4 Topics
-
Cross Site Scripting4 Topics
-
Green Ranger β Breaking the codeCookies and Data4 Topics
-
CTF Challenge β Javascript
-
Module 3: Cyber Crisis SimulationsIncident Response: Save the Cityβs Power Grid!3 Topics
-
Incident Response : Cyber Atack Unfolds3 Topics
-
Incident Response - Defend the Powergrid3 Topics
-
Incident Response : Lessons learned and report writing3 Topics
-
Understanding Data Breaches4 Topics
-
Looking for clues in a breach3 Topics
-
Data Breach Mystery: Find the Insider
-
Ransomware Attack: Pay or Fight?2 Topics
-
Module 4: The Cyber Rangers Final BattleMega CTF Tournament
-
Cyber Ranger Graduation
-
Where to Next? Exploring Cybersecurity Careers
-
Optional Content & Enrichment (10 Extra Sessions)Geographical Mapping
-
Red Team vs. Blue Team
-
Advanced Forensics
-
OSINT Challenges
-
Spy Games
-
Lockpicking 101 (Virtual)
-
Defusing a Virtual Bomb
-
AI in Cybersecurity
-
Create Your Own CTF Challenge
-
Internet of Things (IoT) Hacking
-
Cyber Rangers Hall of Fame
Participants 10
Lesson Companion – What is in the Digital World?
Cyber School 05/12/2025
π§Ύ Cyber Rangers β Module 1, Session 2
Lesson Companion: Whatβs in the Digital World?
Student Notes & Thinking Journal
π― What Youβll Learn Today
- How devices connect through networks
- What the internet really is and how it works
- What happens when you send a message online
- How hackers can intercept that data β and how we defend it
π Notes by Topic
Use the space below to take notes while watching the presentation and participating in class.
π What Is a Network?
π A network is…
π Devices in my home network include:
π What Is the Internet?
π The internet is made up of…
π It works by…
π¦ What Are Data Packets?
π When I send a message, it gets…
π Each packet has:
β A piece of the message
β The destination IP address
β The sender’s IP address
π§ IP Address
π My IP address is like…
π IP addresses help computers…
π DNS β Domain Name System
π DNS is important because…
π Example:
google.com β _______________
π‘ Routers and Switches
π Routers help…
π Switches connect…
π Threats in the Network
π Hackers can use tools to:
β Intercept traffic
β Read unencrypted messages
β Trick DNS systems
π The danger is…
π How Cyber Rangers Defend the Network
π Some tools and techniques we use include:
β Encryption
β Traffic monitoring
β DNS validation
β Using secure websites (https)
π‘ Key Terms to Remember
| Term | What It Means |
|---|---|
| Network | ________________________________ |
| Internet | ________________________________ |
| Packet | ________________________________ |
| IP Address | ________________________________ |
| Router | ________________________________ |
| DNS | ________________________________ |
π§ Lab Preview β What to Expect
Todayβs lab is about mapping a network using a simulator.
Youβll:
- Build a small virtual network
- Connect 2 computers, a router, and a switch
- Watch how data travels between them
π What I think the lab will look like:
π¬ Reflection
- What part of todayβs session was new or surprising to you?
π ________________________________________________________
π ________________________________________________________ - What do you want to explore more about the internet?
π ________________________________________________________
π ________________________________________________________ - Whatβs one way hackers could misuse this technology β and how would you stop it?
π ________________________________________________________
π ________________________________________________________