Google Hacking
This interactive lesson explains how insecure website configurations may expose personal, private and other sensitive information to indexing by Google and other search engines. Attackers may use Google hacking (also called 'Google dorking') techniques to identify vulnerabilities to exploit. Penetration testers run Google hacking queries against organization websites to find exposed information that should be protected and hidden from search engines. A self-assessment is provided at the end of the lesson.
The Heartbleed Bug
This interactive lesson describes the Heartbleed bug, a vulnerability in the popular OpenSSL cryptographic software library. This vulnerability makes it possible for hackers to steal information that's protected, under normal conditions, by the secure socket layer (SSL)/TLS encryption used to secure Internet traffic.
Meltdown and Spectre
This interactive lesson explains Meltdown and Spectre, two vulnerabilities discovered by cybersecurity researchers that affect almost all CPUs released since 1995. Attackers exploiting these vulnerabilities can read data from a computer's kernel memory (Meltdown) but also data handled by other apps (Spectre). Meltdown and Spectre vulnerability exploitations are considered side-channel attacks.
Spoofing Attacks
This interactive lesson defines a spoofing attack as an attack in which a hacker successfully masquerades as another person by falsifying data to gain an illegitimate advantage. The lesson explains four types of spoofing attacks: ARP spoofing attacks, DNS server spoofing attacks, IP address spoofing attacks, and MAC address spoofing attacks.
Malware Types
This interactive lesson describes 10 types of malware, or malicious code: viruses, worms, Trojans, Remote Access Trojans (RATs), logic bombs, keyloggers, spyware, adware, bots and botnets, and rootkits. It also explains advanced persistent threats (APTs) and zero day attacks. A self-assessment is provided at the end of the lesson.
Social Engineering
This interactive lesson describes eight types of social engineering attacks (also called "human hacking"): baiting, shoulder surfing, pretexting, phishing, spear fishing and whaling, scareware and ransomware, tailgating, and dumpster diving.
The Three-way Handshake and Denial-of-Service Attacks
To explain how a denial-of-service attack works, this interactive lesson first describes the three-way handshake, the process of creating a connection between computers communicating using the transmission control protocol (TCP). Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks overwhelm a receiving computer system with incomplete three-way handshake sessions.
Cybersecurity Scenario Activity
This interactive activity challenges students to explore a virtual cybersecurity scenario and identify evidence that suggests what types of exploits a hacker is trying to use.