Begin reading the 1.3.1 – Copper Cables.pptx presentation on the Google Classroom. This lesson will introduce you to different types of copper cables and their standard characteristics.
Next, visit the How to Make a Network Cable: link at https://www.wikihow.com/Make-a-Network-Cable for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends, and a crimper tool.
Follow the instructions to build your passthrough patch cable.
Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for additional practice.
Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.
Assigned: January 16th, 2026 Due Date: January 20th, 2026
Students will be able to analyze different types of log files collected from different network devices to determine abnormal activity that could indicate a possible network attack.
Standards:
3.5.A Describe the types of automated security tools used to detect cyber attacks.
3.5.C Analyze log files for indicators of network attacks.
Guiding Question:
How can log files can help identify threat actors or malicious activity?
Resources:
Information Security Career Video: https://youtu.be/cVZktAEtWE4
3.5 Analyzing Network Logs PPT.pptx available on Google Classroom
3.5 Network Log #1, #2 and #3 available in class.
Assignment:
Read through the 3.5 Analyzing Network Logs PPT.pptx presentation in today’s class.
Divide into groups of 2. You will be provided with Network Log #1, #2 and #3. We will work with these log files in class today.
Work as a team to answer the questions on the back of Network Log #2 and #3. We will work with Network Log #1 as a whole group, then your group will be given time to analyze and answer the questions on the back of Network Log #2, then we will move on to Network Log #3.
Follow along with the in-class presentation and complete the analysis questions on Network Log #2 and Network Log #3 to complete the Lab. We will discuss your results in class.
Assigned: January 14th, 2026 Teacher Pacing Due Date: January 14th, 2026
Students will be able to analyze how logs can be used to support an investigation.
Standards:
CompTIA Security+ SYO-701 Objective:
4.9 – Given a scenario, use data sources to support an investigation
Log data
Firewall logs
Application logs
Endpoint logs
OS-specific security logs
IPS/IDS logs
Network logs
Metadata
Data sources
Vulnerability scans
Automated reports
Dashboards
Packet captures
Guiding Question:
How can logs be used to support an investigation?
Resources:
Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.9.1 – Logs.pptx presentation in today’s class.
Complete the Unit 3 – Logs Check for Understanding activity using the materials provided in Google Classroom.
Complete the Lab – Metadata.pptx Activity in class using the materials provided in Google Classroom.
To confirm completion the lab activity, upload a screenshot displaying the metadata displayed when using exiftool on the target image file to today’s Google Classroom post.
Assigned: January 13th, 2026 Teacher Pacing Due Date: January 14th, 2026
What are some common incident response activities?
Resources:
Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.8.1 – Incident Response.pptx presentation in today’s class.
Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom.
Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom.
To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.
Assigned: January 12th, 2026 Teacher Pacing Due Date: January 13th, 2026