CYBER.ORG: AP Cybersecurity Spring 2026 – 1.3.1 – Copper Cables & 1.3.1 Activity – Ethernet Cat5e Patch Cable Assembly

Objective

  • The student will be able to summarize the types of cables and connectors and explain which is the appropriate type for a solution.

Resources:

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.5 – Compare and contrast common types of input/output device interfaces.See PowerPoint presentation: 1.3.1 – Copper Cables.pptx

  • Networking
    • Wired
      • Ethernet connector (RJ45)
    • Networking devices and tools

Guiding Question:

How are copper wire network cables constructed?

Links:

Topics Discussed:

  • Networking Basics
  • Networking Fundamentals
  • Ethernet
  • EIA/TIA
  • 568A & 568B Standards
  • Cat5, 5e & 6
  • Local Area Network
  • Cable Management

Assignment:

  1. Begin reading the 1.3.1 – Copper Cables.pptx presentation on the Google Classroom. This lesson will introduce you to different types of copper cables and their standard characteristics.
  2. Next, visit the How to Make a Network Cable: link at https://www.wikihow.com/Make-a-Network-Cable for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
  3. Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends, and a crimper tool.
  4. Follow the instructions to build your passthrough patch cable.
  5. Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for additional practice.
  6. Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
  7. Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.

Assigned: January 16th, 2026
Due Date: January 20th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Input Output Interfaces

Objective:

Students will be able to:

  • Distinguish between wired and wireless interfaces and explore the different options of each interface.
  • Identify different networking tools.
  • Apply their knowledge of wired and wireless interfaces to determine which best fits a user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.5 – Compare and contrast common types of input/output device interfaces.

  • Networking
    • Wired
      • Ethernet connector (RJ45)
      • Fiber connector small form-factor pluggable (SFP)
    • Wireless
      • Bluetooth
      • Near-field communication (NFC)
      • 802.11X
    • Networking devices and tools
      • Crimpers
      • Cable testers

Guiding Question:

How do wired and wireless interfaces impact networking?

Resources:

  • Lesson 2.5.1 – Input Output Interfaces.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 2.5.1 – Input Output Interfaces.pptx presentation in today’s class.
  2. Complete the Student Handout 2.5.1 – Input Output Interfaces Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 9th, 2026
Teacher Pacing Due Date: January 12th, 2026

APCK Cyber: AP Cybersecurity – Topic 3.5 Analyzing Network Logs

Objectives:

  • Students will be able to analyze different types of log files collected from different network devices to determine abnormal activity that could indicate a possible network attack.

Standards:

  • 3.5.A Describe the types of automated security tools used to detect cyber attacks.
  • 3.5.C Analyze log files for indicators of network attacks.

Guiding Question:

How can log files can help identify threat actors or malicious activity?

Resources:

  • Information Security Career Video: https://youtu.be/cVZktAEtWE4
  • 3.5 Analyzing Network Logs PPT.pptx available on Google Classroom
  • 3.5 Network Log #1, #2 and #3 available in class.

Assignment:

  1. Read through the 3.5 Analyzing Network Logs PPT.pptx presentation in today’s class.
  2. Divide into groups of 2. You will be provided with Network Log #1, #2 and #3. We will work with these log files in class today.
  3. Work as a team to answer the questions on the back of Network Log #2 and #3. We will work with Network Log #1 as a whole group, then your group will be given time to analyze and answer the questions on the back of Network Log #2, then we will move on to Network Log #3.
  4. Follow along with the in-class presentation and complete the analysis questions on Network Log #2 and Network Log #3 to complete the Lab. We will discuss your results in class.

Assigned: January 14th, 2026
Teacher Pacing Due Date: January 14th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.9.1 – Logs

Objective:

  • Students will be able to analyze how logs can be used to support an investigation.

Standards:

CompTIA Security+ SYO-701 Objective:

4.9 – Given a scenario, use data sources to support an investigation

  • Log data
    • Firewall logs
    • Application logs
    • Endpoint logs
    • OS-specific security logs
    • IPS/IDS logs
    • Network logs
    • Metadata
  • Data sources
    • Vulnerability scans
    • Automated reports
    • Dashboards
    • Packet captures

Guiding Question:

How can logs be used to support an investigation?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.9.1 – Logs.pptx presentation in today’s class.
  2. Complete the Unit 3 – Logs Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Metadata.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the metadata displayed when using exiftool on the target image file to today’s Google Classroom post.

Assigned: January 13th, 2026
Teacher Pacing Due Date: January 14th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.8.1 – Incident Response

Objective:

  • Students will be able to investigate common incident response activities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.8 – Explain appropriate incident response activities

  • Process
    • Preparation
    • Detection
    • Analysis
    • Containment
    • Eradication
    • Recovery
    • Lessons learned
  • Training
  • Testing
    • Tabletop exercise
    • Simulation
  • Root cause analysis
  • Threat hunting
  • Digital forensics
    • Legal hold
    • Chain of custody
  • Acquisition
  • Reporting
  • Preservation
  • E-discovery

Guiding Question:

What are some common incident response activities?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.8.1 – Incident Response.pptx presentation in today’s class.
  2. Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.

Assigned: January 12th, 2026
Teacher Pacing Due Date: January 13th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.7.1 – Scripting and Automation

Objective:

  • Students will be able to explain the importance of automation and orchestration in secure operations.

Standards:

CompTIA Security+ SYO-701 Objective:

4.7 – Explain the importance of automation and orchestration related to secure operations.

  • Use cases of automation and scripting
    • User provisioning
    • Resource provisioning
    • Guard rails
    • Security groups
    • Ticket creation
    • Escalation
    • Enabling/disabling services and access
    • Continuous integration and testing
    • Integrations and Applications programming interfaces (APIs)
  • Benefits
    • Efficiency/time saving
    • Enforcing baselines
    • Standard infrastructure configurations
    • Scaling in a secure manner
    • Employee retention
    • Reaction time
    • Workforce multiplier
  • Other considerations
    • Complexity
    • Cost
    • Single point of failure
    • Technical debt
    • Ongoing supportability

Guiding Question:

What is the importance of automation and orchestration in secure operations?

Resources:

  • Lesson 4.7.1 – Scripting and Automation.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 4.7.1 – Scripting and Automation.pptx presentation in today’s class.
  2. Complete the Unit 3 – Scripting and Automation Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 9th, 2026
Teacher Pacing Due Date: January 12th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.6.1 – Access Management

Objective:

  • Students will investigate common methods to manage access.

Standards:

CompTIA Security+ SYO-701 Objective:
4.6 – Given a scenario, implement and maintain identity and access management

  • Provisioning/de-provisioning user accounts
  • Permission assignments and implications
  • Identity proofing
  • Federation
  • Single sign-on (SSO)
    • Lightweight Directory Access Protocol (LDAP)
    • Open authorization (OAuth)
    • Security Assertions Markup Language (SAML)
  • Interoperability
  • Attestation
  • Access controls
    • Mandatory
    • Discretionary
    • Role-based
    • Rule-based
    • Attribute-based
    • Time-of-day restrictions
    • Least privilege
  • Privileged access management tools
    • Just-in-time permissions
    • Password vaulting
    • Ephemeral credentials

Guiding Question:

What are some common methods to manage access?

Resources:

  • Lesson 4.1.3 – Mobile Solutions.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
  2. Complete the Unit 3 – Access Management Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Case Study – Quantum Cryptography.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025

CYBER.ORG: AP Cybersecurity – 4.1.1 – Hardening Targets and Secure Baselines

Objective:

  • Students will be able to analyze common architecture and infrastructure concepts.

Standards:

CompTIA Security+ SYO-701 Objective:

4.1 – Given a scenario, apply common security techniques to computing

  • Secure baselines
    • Establish
    • Deploy
    • Maintain
  • Hardening targets
    • Mobile devices
    • Workstations
    • Switches
    • Routers
    • Cloud infrastructure
    • Servers
    • ICS/SCADA
    • Embedded Systems
    • RTOS
    • IoT devices

Guiding Question:

What are common methods to secure baselines and harden targets?

Resources:

  • 4.1.1 – Hardening Targets and Secure Baselines.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 4.1.1 – Hardening Targets and Secure Baselines.pptx presentation in today’s class.
  2. Complete the Unit 3 – Hardening Targets and Secure Baselines Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 7th, 2026
Teacher Pacing Due Date: January 8th, 2026

CYBER.ORG: AP Cybersecurity – 3.1.1 – Architecture and Infrastructure Concepts & Case Study – Specialized Systems Vulnerabilities

Objective:

  • Students will be able to analyze common architecture and infrastructure concepts.

Standards:

CompTIA Security+ SYO-701 Objective:

3.1 – Compare and contrast security implications of different architecture models

  • Architecture and infrastructure concepts
    • Cloud
      • Responsibility matrix
      • Hybrid considerations
      • Third-party vendors
    • Infrastructure as code (IaC)
    • Serverless
    • Microservices
    • Network infrastructure
      • Physical isolation
        • Air-gapped
      • Logical segmentation
        • Software-defined networking (SDN)
    • On-premises
    • Centralized vs. decentralized
    • Containerization
    • Virtualization
    • IoT
    • Industrial control systems (ICS)/supervisory control and data acquisition (SCADA)
    • Real-time operating system (RTOS)
    • Embedded systems
    • High availability

Guiding Question:

What are common architecture and infrastructure concepts?

Resources:

  • 3.1.1 – Architecture and Infrastructure Concepts.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 3.1.1 – Architecture and Infrastructure Concepts.pptx presentation in today’s class.
  2. Complete the Unit 3 – Architecture and Infrastructure Concepts Check for Understanding activity using the materials provided in Google Classroom.
  3. Next, complete the Case Study – Specialized Systems Vulnerabilities Activity using the document and Form posted in the Google Classroom.
  4. Please do your best to complete the Case Study by end of day on Wednesday, January 7th.

Assigned: January 6th, 2026
Teacher Pacing Due Date: January 7th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Mitigation Techniques

Objective:

  • Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.

Standards:

CompTIA Security+ SYO-701 Objective:

2.5 – Explain the purpose of mitigation techniques used to secure the enterprise

  • Segmentation
  • Access control
    • Access control list (ACL)
    • Permissions
  • Application allow list
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least privilege
  • Configuration enforcement
  • Decommissioning

Guiding Question:

What are common mitigation techniques that can be used to secure the enterprise?

Resources:

  • Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Mitigation Techniques.pptx presentation in today’s class.
  2. Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom.

Assigned: January 5th, 2025
Teacher Pacing Due Date: January 6th, 2025

It's dangerous to go alone!