Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Zoom Links
    1 Topic
  3. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  4. What’s in the Digital World?
    3 Topics
  5. Cyber Threats: Meet the Villains
    3 Topics
  6. The Cyber Defense Arsenal
    3 Topics
  7. The Art of the Hack
    3 Topics
  8. CTF: The First Mission
    2 Topics
  9. Red Ranger – Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  10. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  11. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  12. CTF Challenge – Network Defense
  13. Blue Ranger – Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  14. The Secret Language of Codes
  15. Modern Encryption: How Does It Work?
  16. Breaking the Code: Ethical Decryption
  17. CTF Challenge – Cryptography
  18. Yellow Ranger – Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
  19. Social Engineering: Trick or Treat?
  20. Web App Hacking: Finding Weak Spots
  21. CTF Challenge – Ethical Hacking
  22. Green Ranger – Threat Hunter (Sessions 19-20)
    Becoming a Threat Hunter
  23. CTF Challenge – Threat Hunting
  24. Module 3: Cyber Crisis Simulations
    Incident Response: Save the City’s Power Grid!
  25. Data Breach Mystery: Find the Insider
  26. Ransomware Attack: Pay or Fight?
  27. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  28. Final Mission: Defend Cyber City
  29. Cyber Ranger Graduation
  30. Where to Next? Exploring Cybersecurity Careers
  31. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  32. Red Team vs. Blue Team
  33. Advanced Forensics
  34. OSINT Challenges
  35. Spy Games
  36. Lockpicking 101 (Virtual)
  37. Defusing a Virtual Bomb
  38. AI in Cybersecurity
  39. Create Your Own CTF Challenge
  40. Internet of Things (IoT) Hacking
  41. Cyber Rangers Hall of Fame
Lesson Progress
0% Complete

🧾 Cyber Rangers – Module 1, Session 2

Lesson Companion: What’s in the Digital World?
Student Notes & Thinking Journal


🎯 What You’ll Learn Today

  • How devices connect through networks
  • What the internet really is and how it works
  • What happens when you send a message online
  • How hackers can intercept that data β€” and how we defend it

πŸ““ Notes by Topic

Use the space below to take notes while watching the presentation and participating in class.


πŸ”Œ What Is a Network?

πŸ–Š A network is…




πŸ–Š Devices in my home network include:




🌐 What Is the Internet?

πŸ–Š The internet is made up of…



πŸ–Š It works by…




πŸ“¦ What Are Data Packets?

πŸ–Š When I send a message, it gets…




πŸ–Š Each packet has:
☐ A piece of the message
☐ The destination IP address
☐ The sender’s IP address


🧭 IP Address

πŸ–Š My IP address is like…


πŸ–Š IP addresses help computers…



🌍 DNS – Domain Name System

πŸ–Š DNS is important because…



πŸ–Š Example:
google.com β†’ _______________


πŸ“‘ Routers and Switches

πŸ–Š Routers help…


πŸ–Š Switches connect…



🐍 Threats in the Network

πŸ–Š Hackers can use tools to:
☐ Intercept traffic
☐ Read unencrypted messages
☐ Trick DNS systems

πŸ–Š The danger is…




πŸ” How Cyber Rangers Defend the Network

πŸ–Š Some tools and techniques we use include:
☐ Encryption
☐ Traffic monitoring
☐ DNS validation
☐ Using secure websites (https)


πŸ’‘ Key Terms to Remember

TermWhat It Means
Network________________________________
Internet________________________________
Packet________________________________
IP Address________________________________
Router________________________________
DNS________________________________

🧠 Lab Preview – What to Expect

Today’s lab is about mapping a network using a simulator.
You’ll:

  • Build a small virtual network
  • Connect 2 computers, a router, and a switch
  • Watch how data travels between them

πŸ–Š What I think the lab will look like:




πŸ’¬ Reflection

  1. What part of today’s session was new or surprising to you?
    πŸ–Š ________________________________________________________
    πŸ–Š ________________________________________________________
  2. What do you want to explore more about the internet?
    πŸ–Š ________________________________________________________
    πŸ–Š ________________________________________________________
  3. What’s one way hackers could misuse this technology β€” and how would you stop it?
    πŸ–Š ________________________________________________________
    πŸ–Š ________________________________________________________