New: coding-clubAll contenthive-129948hive-196917krzzanhive-185836steemhive-183959hive-180932hive-150122photographyhive-166405hive-144064hive-101145hive-184714hive-188619hive-183397hive-145157uncommonlabhive-103599bitcoinhive-193637hive-193186hive-113376hive-139150krsuccessTrendingNewHotLikersalphydan (35)in teaching • 7 years agosteemCreated with Sketch.Teaching Cyber Security (Table of Contents)This is the table of contents for a 17 part series on teaching cybersecurity to middle and high school students. Introduction to the shell Introduction , The challenge and introduction to…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 17)This is the 17th post of a series for teaching cyber-security in a coding-club. Read [ part 16 ] Putting it all together Combining it all In this unit we'll use what we have learnt in the…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 16)This is the 16th post of a series for teaching cyber-security in a coding-club. Read [ part 15 ] Bash scripts The Shell By now you should be familiar with the operation of the shell (and the…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 15)This is the 15th post of a series for teaching cyber-security in a coding-club. Read [ part 14 ]. Host & whois Information gathering When hackers want to attack a target they will have an…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 14)This is the 14th post of a series for teaching cyber-security in a coding-club. Read [ part 13 ]. Ping Pong on the World Wide Web Connecting to the internet In the first module you learnt…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 13)This is the 13th post of a series for teaching cyber-security in a coding-club. Read [ part 12 ] Overview Cowsay Let's install a new program called cowsay . Remember you can do that with:…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 12)This is the 12th post of a series for teaching cyber-security in a coding-club. Read [ part 11 ] Copying files I need the same file in different directories As we have learned, bash…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 11)This is the 11th post of a series for teaching cyber-security in a coding-club. Read [ part 10 ]. Pipes and security Pipes and dictionaries How would you guess a password? A lot of people…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 10)This is the 10th post of a series for teaching cyber-security in a coding-club. Read [ part 9 ]. Pipe and count Disk Usage In our mission we may have to inspect large files. For example…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 9)This is the 9th post of a series for teaching cyber-security in a coding-club. Read [ part 8 ] Create directories and move files Creating directories We have a lot of files and folders on…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 8)This is the 8th post of a series for teaching cyber-security in a coding-club. Read [ part 7 ] Seeing processes View all processes in a machine You should have done the following: sudo apt…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 7)This is the 7th post of a series for teaching cyber-security in a coding-club. Read [ part 6 ]. Hacking and protecting the secret server Our mission is to get inside this server and fix…alphydan (35)in cibersecurity • 7 years agoTeaching Cyber Security (U2/P3)This post has moved to:alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Unit2 - Part 1)Hacking and protecting the secret server Our mission is to get inside this server and fix the security : In the previous unit, we learnt to interact with the shell , to send…alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Part 6)This is the 6th post of a series for teaching cyber-security in a coding-club. Read [ part 5 ]. If you are teaching this course you can clone the files and directories to follow along. The…alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Part 5)This is the 5th post of a series for teaching cyber-security in a coding-club. Read [ part 4 ] Listing hidden files The ls command ommited directories and files with a dot Aha! You are…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 4)This is the 4th post of a series for teaching cyber-security in a coding-club. Read [ part 3 ] Where we are currently? Remember that we said our server in Holland won't have a mouse, a…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 3)This is the 3rd post of a series for teaching cyber-security in a coding-club. Read [ part 2 ] Introduction The shell is sometimes called terminal , command line interface or CLI.…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 2)This is the 2nd post of a series for teaching cyber-security in a coding-club. Read [ part 1 ] Where is he typing? and what do those commands mean? 1.1.2 The layers in a computer Most…alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Part 1)Intro I teach Physics in an all-girls school and run a coding club once a week. My students are free to join, and are between the ages of 10 and 17. My first surprise came with the absolute top…