CYBER.ORG: AP Cybersecurity – Lesson 4.3.2 – Vulnerability Management

Objective:

  • Students will analyze common methods to manage vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.3 – Explain various activities associated with vulnerability management

  • Analysis
    • Confirmation
      • False positive
      • False negative
      • Prioritize
      • Common Vulnerability Scoring System (CVSS)
      • Common Vulnerability Enumeration (CVE)
      • Vulnerability classification
      • Exposure factor
      • Environmental variables
      • Industry/organizational impact
      • Risk tolerance
  • Vulnerability response and remediation
    • Patching
    • Insurance
    • Segmentation
    • Compensating controls
    • Exceptions and exemptions
  • Validation of remediation
    • Rescanning
    • Audit
    • Verification
  • Reporting

Guiding Question:

  • What are some common methods to identify vulnerabilities?

Resources:

Lesson 4.3.2 – Vulnerability Management.pptx Presentation and 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the 4.3.2 – Vulnerability Management.pptx presentation in today’s class.
  2. Complete the 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: October 27th, 2025
Teacher Pacing Due Date: October 28th, 2025

APCK Cyber: AP Cybersecurity – Topic 2.2 – Protecting Spaces

Objectives:

  • Students will be able to work in teams as an IT department to design cost-effective security plans for various organizational scenarios.

Standards:

  • Students will be able to use a risk matrix to prioritize physical vulnerabilities in a given scenario.
  • Students will be able to design a cost-effective security plan that combines managerial and physical controls.

Guiding Question:

Why is Physical Security important to Cybersecurity?

Resources:

  • Video Reviewing Risk Matrix:
    https://www.youtube.com/watch?v=-E-jfcoR2W0
  • 2.2 Protecting Spaces Slide Deck.pptx available on Google Classroom
  • 2.2 Scenarios Student Lab Guide available on Google Classroom

Assignment:

  1. Read through the 2.2 Protecting Spaces Slide Deck.pptx presentation in today’s class.
  2. Divide into groups of 2 – 3. There are five stations located around the classroom, each with a physical facility that you will be tasked with securing. Choose one of the five stations to start with.
  3. Work as a team to complete the 2.2 Scenarios Student Lab Guide document available in the Google Classroom to for the physical facility represented by your station. You will be given time to answer the questions in the Lab Guide for your given scenario, then we will rotate to the next station.
  4. Follow the instructions in the Lab Guide to complete the Risk Matrix and design resource-efficient security plans to balance the various priorities in each scenario. We will discuss your results in class.

Assigned: October 22nd, 2025
Teacher Pacing Due Date: October 23rd, 2025

CYBER.ORG: AP Cybersecurity – Topic 4.3.1 – Identifying Vulnerabilities

Objective:

  • Students will analyze common methods to identify vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management

  • Identification methods
    • Vulnerability scan
    • Application security
      • Static analysis
      • Dynamic analysis
      • Package monitoring
    • Threat feed
      • Open-source intelligence (OSINT)
      • Proprietary/third-party
      • Information-sharing organization
      • Dark web
    • Penetration testing
    • Responsible disclosure program
      • Bug bounty program
    • System/process audit

Guiding Question:

What are some common methods to identify vulnerabilities?

Resources:

  • 4.3.1 – Identifying Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 4.3.1 – Identifying Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Pen Testing Activity in class using the materials provided in Google Classroom.

Assigned: October 20th, 2025
Teacher Pacing Due Date: October 21st, 2025

CYBER.ORG: AP Cybersecurity – Lesson 1.2.3 – Physical Security

Objective:

  • Students will be able to explain the importance of physical security controls.

Standards:

CompTIA Security+ SYO-701 Objective:
1.2 – Summarize fundamental security concepts

  • Physical Security
    • Bollards
    • Access Control Vestibule
    • Fencing
    • Video Surveillance
    • Security guard
    • Access badge
    • Lighting
    • Sensors
      • Infrared
      • Pressure
      • Microwave
      • Ultrasonic

Guiding Question:

  • What are some physical security controls organizations can implement to better protect the network?

Resources:

  • Lesson 1.2.3 – Physical Security.pptx Presentation and Physical Security Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the 1.2.3 – Physical Security.pptx presentation in today’s class.
  2. Complete the Physical Security Check for Understanding – Fall 2025 Quiz using the materials provided.

Assigned: October 15th, 2025
Teacher Pacing Due Date: October 16th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.7 – Physical Attacks

Objective:

  • Students will analyze potential indicators to determine the type of attack.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Physical Attacks
    • Brute Force
    • Radio frequency identification (RFID) cloning
    • Environmental

Guiding Question:

  • What are 3 common physical attacks and how can students defend themselves against them?

Resources:

  • Lesson 2.4.7 – Physical Attacks.pptx Presentation and Physical Attacks Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the Lesson 2.4.7 – Physical Attacks.pptx presentation in today’s class.
  2. Complete the Physical Attacks Guided Notes – Fall 2025 Form using the materials provided.

Assigned: October 14th, 2025
Teacher Pacing Due Date: October 15th, 2025

CYBER.ORG: AP Cybersecurity – Topic 3.2.3 – Secure Communication/Access and Effective Controls

Objective:

  • Students will learn to implement the tools to design a secure network.

Standards:

CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Secure communication/access
    • Virtual private network (VPN)
    • Remote access
    • Tunneling
      • Transport Layer Security (TLS)
      • Internet protocol security (IPSEC)
    • Software-defined wide area network (SD-WAN)
    • Secure access service edge (SASE)
  • Selection of effective controls

Guiding Question:

How are secure networks designed?

Resources:

  • Lesson 3.2.3 – Secure Communication – Access and Efective Controls Presentation available on Google Classroom

Assignment:

  1. Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
  2. Complete the Case Study – NordVPN Hack Activity in class using the materials provided in Google Classroom.

Assigned: October 13th, 2025
Teacher Pacing Due Date: October 14th, 2025

CYBER.ORG – Lesson 2.5.2 – Hardening Techniques & Labs – Backdoor Shortcut & Backdoor Removal

Objective:
Students will be able to explain the purpose of hardening techniques used to secure enterprise.

Resources:

  • See PowerPoint presentations: Lesson 2.5.2 – Hardening Techniques.pptx,  Lab – Backdoor Shortcut.pptx and Lab – Backdoor Removal.pptx.

Assignment:

  1. Begin by reading the Lesson 2.5.2 – Hardening Techniques.pptx presentation.
  2. Read and complete the lab activity in the Lab – Backdoor Shortcut.pptx document.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
  4. If you have time, read and complete the Lab – Backdoor Removal.pptx
  5. Please do your best to complete this Lab by the end of the class period on Friday.

Assigned: October 2nd, 2025
Teacher Pacing Due Date: October 3rd, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.4 – Application Security, Lesson 4.5.2 – Endpoint – OS & Monitoring & Lesson 1.1.1 – Security Controls

Objective:

  • Students will:
    • Be able to explain how organizations can be more cyber resilient.
    • Investigate common methods to enhance Operating System security and implement monitoring measures in an enterprise.
    • Compare and contrast various types of security controls

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Application security
    • Input validation
    • Secure cookies
    • Static code analysis
    • Code signing
  • Sandboxing
  • Monitoring

4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Operating system security
    • Group Policy
    • SELinux
  • File integrity monitoring
  • DLP
  • Network access control (NAC)
  • Endpoint detection and response (EDR)/extended detection and response (XDR)
  • User behavior analytics

1.1 – Compare and contrast various types of controls

  • Category
    • Technical,
      • Managerial,
      • Operational,
      • Physical,
    • Control Type
      • Preventive
      • Deterrent
      • Detective
      • Corrective
      • Compensating
      • Directive

Guiding Questions:

  • How are applications secured?
  • What are some common methods for an enterprise to enhance Operating System security and implement monitoring measures?
  • What are some different control categories and control types?

Resources:

  • Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx Presentations and Security Concepts Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx presentations in today’s class.
  2. Complete the Security Concepts Guided Notes – Fall 2025 Form using the materials provided.

Assigned: September 30th, 2025
Teacher Pacing Due Date: October 1st, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.5.1 – Endpoint – Protocol & Email Security

Objective:

  • Students will be able to explain how organizations can be more cyber resilient.

Standards:

CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Implementation of secure protocols
    • Protocol selection
    • Port selection
    • Transport method
  • DNS filtering
  • Email security
    • Domain-based Message Authentication Reporting and Conformance (DMARC)
    • DomainKeys Identified Mail (DKIM)
    • Sender Policy Framework (SPF)
    • Gateway

Guiding Question:

What are some common methods to enhance security for enterprise networks and communications?

Resources:

  • Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx Presentation and Case Study – Heartbleed.pdf available on Google Classroom

Assignment:

  1. Read through the Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx presentation in today’s class.
  2. Complete the Case Study – Heartbleed.pdf using the materials provided.

Assigned: September 29th, 2025
Teacher Pacing Due Date: September 30th, 2025

CYBER.ORG – Lab – Fun With Linux – Fall 2025

Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.

Topics Discussed:

APT Repository
apt-cache
apt-get
redirection (with “|” pipe)
CTRL + C (break)
options/flags
cat
nano
tar archive
chmod
perl

Resources:

  • PowerPoint presentation: Lab – Fun With Linux
  • PDF document: Linux Commands Cheat Sheet.pdf

Assignment:

  1. Begin reading the Lab – Fun With Linux presentation to have a little fun while practicing with commands in the Linux operating system.
  2. This lab will introduce you to the APT Repository, an open source collection of apps, games and utilities that can be downloaded and used in Linux for free.
  3. Notice that the games and utilities that you will encounter in today’s lab use many of the commands and techniques that we have been studying over the past week!
  4. To complete today’s Lab activity, upload a screenshot of your ASCII aquarium to today’s Google Classroom assignment post!
  5. Bonus: On today’s assignment post, you will find the promised Linux Commands Cheat Sheet! Download it, and use it in good health.

Assigned: September 24th, 2025
Teacher Pacing Due Date: September 25th, 2025

It's dangerous to go alone!