Curriculum Structure

A suggested 10-week course combining books, app exercises, and lab simulations

10-week network security curriculum overview
Week Topic Book Chapter Lab App Focus
1 Introduction: The Invisible Digital World Signal, Ch. 1-3 Install app, Basic Mode, WiFi tab
2 WiFi Fundamentals & Rogue Access Points Signal, Ch. 4-8 Lab 1: Evil Twin WiFi scanning, SSID analysis
3 WiFi Channels & RF Environment Lab 8: Channel Analysis Analyzer, channel visualization
4 Baselines & Normal vs. Abnormal Baseline, Ch. 1-5 Lab 2: Baseline & Drift SOC mode, Inventory tab
5 Bluetooth & Device Tracking Pattern, Ch. 1-4 Lab 4: Bluetooth Recon Bluetooth tab, Advanced Mode
6 Network Devices & Infrastructure Source, Ch. 1-5 Lab 5: Device Discovery Tools: Subnet Mapper, Port Scanner
7 ARP, Gateways & Man-in-the-Middle Baseline, Ch. 6-10 Lab 3: ARP Monitoring Events tab, gateway alerts
8 DNS & Trust on the Internet Lab 6: DNS & TLS Tools: DNS Probe, TLS Validator
9 Wireless Environment Survey Lab 9: War Walk Map tab, Analyzer reports
10 Incident Response & SOC Operations Trace, Ch. 1-6 Lab 7 & Lab 10 SOC mode, full export

Flexible by design: This curriculum is a suggestion, not a requirement. Teachers can pick individual labs and topics as standalone lessons, reorder the sequence, or extend it with additional Field Stories readings. Every component works independently.

Downloadable Materials

Ready-to-use documents for classroom instruction

Lesson Plans

Introduction to Wireless Security — Lesson Plan

60-minute lesson introducing invisible digital infrastructure, WiFi basics, and the Z.R.A.K. app. Includes discussion prompts and homework.

Coming Soon

Evil Twin Detection — Lesson Plan & Lab Guide

90-minute combined lesson and hands-on lab. Includes teacher setup instructions, student worksheets, and assessment rubric.

Coming Soon

Network Baseline Concepts — Lesson Plan

60-minute lesson on baselines, drift detection, and the Jaccard similarity index. Ties to Z.R.A.K.: Baseline book themes.

Coming Soon

Incident Response Fundamentals — Lesson Plan

90-minute lesson on the observe-document-report workflow. Covers event vs. incident, severity levels, and evidence-based reporting.

Coming Soon

Student Worksheets

WiFi Network Analysis Worksheet

Structured form for students to document discovered WiFi networks: SSID, security type, signal strength, channel, and risk assessment.

Coming Soon

Bluetooth Device Catalog Worksheet

Form for cataloging Bluetooth devices: name, type, MAC address, manufacturer, signal strength, and behavioral notes.

Coming Soon

Network Device Inventory Template

Complete network inventory form: IP, MAC, vendor, OS, open ports, services, and trust classification.

Coming Soon

Incident Report Template

Structured incident report form: timeline, evidence log, severity assessment, and recommended actions.

Coming Soon

Discussion & Assessment

Ethics in Cybersecurity — Discussion Guide

Guided discussion prompts exploring observation vs. exploitation, responsible disclosure, and competence as responsibility. Based on themes from the Z.R.A.K. book series.

Coming Soon

Network Security Knowledge Assessment

End-of-course assessment covering WiFi security, Bluetooth, ARP, DNS, TLS, baselines, and incident response. Multiple choice and short answer.

Coming Soon

Lab Assessment Rubric

Scoring rubric for lab exercises covering: technical accuracy, documentation quality, ethical reasoning, and collaborative skills.

Coming Soon

Lab Equipment Guide

What you need to run the full lab curriculum

Minimum Setup

Basic Lab (Budget-Friendly)

Enough to run most labs with teacher demonstration:

  • 1x consumer WiFi router (any brand, dual-band preferred)
  • 1x additional WiFi router or mobile hotspot (for evil twin labs)
  • 1x Android phone/tablet with Z.R.A.K. (Android 12+)
  • Students' own Android devices for observation exercises
  • Assorted Bluetooth devices (headphones, speakers, etc.)
Recommended Setup

Full Lab (Hands-On for All Students)

For classes where every student or pair has a device:

  • 2-3 WiFi routers (for multi-channel and evil twin labs)
  • 1x Raspberry Pi with dnsmasq (for DNS labs)
  • Android devices for students — 1 per pair minimum
  • Google Pixel recommended for best Z.R.A.K. experience
  • Various IoT/smart devices for device discovery labs
  • BLE beacon or tag for Bluetooth tracker lab
  • Ethernet cables and a small switch (optional, for wired demos)

Key Terms Glossary

Essential vocabulary for the Z.R.A.K. curriculum

Glossary of network security terms used in the Z.R.A.K. curriculum
TermDefinition
AP (Access Point)A wireless networking device that allows WiFi devices to connect to a network. Your router at home is an access point.
ARPAddress Resolution Protocol — maps IP addresses to MAC (hardware) addresses on a local network. Lacks authentication, making it vulnerable to spoofing.
BaselineA snapshot of the "normal" state of a network environment. Used as a reference to detect changes (drift).
BLEBluetooth Low Energy — a power-efficient version of Bluetooth used by fitness trackers, beacons, IoT devices, and tracking tags.
BSSIDBasic Service Set Identifier — the MAC address of a WiFi access point. Each physical radio has a unique BSSID.
DNSDomain Name System — translates human-readable domain names (e.g., google.com) into IP addresses. Can be spoofed to redirect traffic.
DriftChange in the network environment compared to a captured baseline. Can indicate legitimate changes or adversarial activity.
Evil TwinA rogue access point that impersonates a legitimate network by copying its SSID. Used to trick devices into connecting to the attacker.
Jaccard IndexA similarity score (0.0 to 1.0) comparing two sets. In Z.R.A.K., it measures how much the current scan matches the baseline. 1.0 = perfect match.
MAC AddressMedia Access Control address — a unique hardware identifier assigned to every network interface. Can reveal the device manufacturer.
Man-in-the-MiddleAn attack where the adversary positions themselves between two communicating parties, intercepting and potentially modifying traffic.
RSSIReceived Signal Strength Indicator — a measurement of how strong a wireless signal is, typically in dBm. Closer to 0 = stronger signal.
SSIDService Set Identifier — the name of a WiFi network as it appears in your device's network list.
TLSTransport Layer Security — the encryption protocol that protects HTTPS connections. Certificates verify server identity.
WPA2/WPA3WiFi Protected Access — security protocols that encrypt WiFi traffic. WPA3 is the latest and most secure standard.

Need Something Specific?

These materials are being actively developed. If you're a teacher planning to use Z.R.A.K. in your classroom and need specific resources, reach out through mirofeld.com/contact.