Students will analyze common methods to manage vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management
Analysis
Confirmation
False positive
False negative
Prioritize
Common Vulnerability Scoring System (CVSS)
Common Vulnerability Enumeration (CVE)
Vulnerability classification
Exposure factor
Environmental variables
Industry/organizational impact
Risk tolerance
Vulnerability response and remediation
Patching
Insurance
Segmentation
Compensating controls
Exceptions and exemptions
Validation of remediation
Rescanning
Audit
Verification
Reporting
Guiding Question:
What are some common methods to identify vulnerabilities?
Resources:
Lesson 4.3.2 – Vulnerability Management.pptx Presentation and 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
Read through the 4.3.2 – Vulnerability Management.pptx presentation in today’s class.
Complete the 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: October 27th, 2025 Teacher Pacing Due Date: October 28th, 2025
Read through the 2.2 Protecting Spaces Slide Deck.pptx presentation in today’s class.
Divide into groups of 2 – 3. There are five stations located around the classroom, each with a physical facility that you will be tasked with securing. Choose one of the five stations to start with.
Work as a team to complete the 2.2 Scenarios Student Lab Guidedocument available in the Google Classroom to for the physical facility represented by your station. You will be given time to answer the questions in the Lab Guide for your given scenario, then we will rotate to the next station.
Follow the instructions in the Lab Guide to complete the Risk Matrix and design resource-efficient security plans to balance the various priorities in each scenario. We will discuss your results in class.
Assigned: October 22nd, 2025 Teacher Pacing Due Date: October 23rd, 2025
Objective: Students will be able to explain the purpose of hardening techniques used to secure enterprise.
Resources:
See PowerPoint presentations: Lesson 2.5.2 – Hardening Techniques.pptx, Lab – Backdoor Shortcut.pptx and Lab – Backdoor Removal.pptx.
Assignment:
Begin by reading the Lesson 2.5.2 – Hardening Techniques.pptx presentation.
Read and complete the lab activity in the Lab – Backdoor Shortcut.pptx document.
To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
If you have time, read and complete the Lab – Backdoor Removal.pptx
Please do your best to complete this Lab by the end of the class period on Friday.
Assigned: October 2nd, 2025 Teacher Pacing Due Date: October 3rd, 2025
Be able to explain how organizations can be more cyber resilient.
Investigate common methods to enhance Operating System security and implement monitoring measures in an enterprise.
Compare and contrast various types of security controls
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Application security
Input validation
Secure cookies
Static code analysis
Code signing
Sandboxing
Monitoring
4.5 – Given a scenario, modify enterprise capabilities to enhance security
Operating system security
Group Policy
SELinux
File integrity monitoring
DLP
Network access control (NAC)
Endpoint detection and response (EDR)/extended detection and response (XDR)
User behavior analytics
1.1 – Compare and contrast various types of controls
Category
Technical,
Managerial,
Operational,
Physical,
Control Type
Preventive
Deterrent
Detective
Corrective
Compensating
Directive
Guiding Questions:
How are applications secured?
What are some common methods for an enterprise to enhance Operating System security and implement monitoring measures?
What are some different control categories and control types?
Resources:
Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx Presentations and Security Concepts Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
Read through the Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx presentations in today’s class.
Complete the Security Concepts Guided Notes – Fall 2025 Form using the materials provided.
Assigned: September 30th, 2025 Teacher Pacing Due Date: October 1st, 2025
Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.
Topics Discussed:
APT Repository apt-cache apt-get redirection (with “|” pipe) CTRL + C (break) options/flags cat nano tar archive chmod perl
Resources:
PowerPoint presentation: Lab – Fun With Linux
PDF document: Linux Commands Cheat Sheet.pdf
Assignment:
Begin reading the Lab – Fun With Linux presentation to have a little fun while practicing with commands in the Linux operating system.
This lab will introduce you to the APT Repository, an open source collection of apps, games and utilities that can be downloaded and used in Linux for free.
Notice that the games and utilities that you will encounter in today’s lab use many of the commands and techniques that we have been studying over the past week!
To complete today’s Lab activity, upload a screenshot of your ASCII aquarium to today’s Google Classroom assignment post!
Bonus: On today’s assignment post, you will find the promised Linux Commands Cheat Sheet! Download it, and use it in good health.
Assigned: September 24th, 2025 Teacher Pacing Due Date: September 25th, 2025