Teaching Cybersecurity with the Arkansas Range

This series will cover the eight curriculum modules developed through a partnership with ADE, UCA, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

Module 2: Knowing Normal: Recognizing Traffic Patterns

Knowing what normal looks like in a network is key in understanding it but is also important in troubleshooting problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.

 

Lesson One

Know Normal 
(Segment 1 of 10)
Baselining 
(Segment 2 of 10)
ARP Table Activity 
(Segment 3 of 10)
Ping Sweep 
(Segment 4 of 10)
Ping Sweep Command 
(Segment 5 of 10)

Lesson Two

Nmap and Zenmap 
(Segment 6 of 10)
Asset Management 
(Segment 7 of 10)
Monitoring Network Traffic 
(Segment 8 of 10)
Network Mapping and Packet Analysis 
(Segment 9 of 10)
Summing Up 
(Segment 10 of 10)