APCK Cyber: AP Cybersecurity – Topic 5.2 Setting Access Controls

Objectives:

  • Students will be able to configure access control settings on a Linux-based system.

Standards:

CompTIA SY0-701 Objectives:

• 4.6.1 – Provisioning/de-provisioning user accounts

Guiding Question:

Why are access controls important, and why do we need them?

Resources:

  • 5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom

Assignment:

  1. Read through the 5.2 Setting Access Controls.pptx presentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
  2. Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.

Assigned: March 26th, 2026
Teacher Pacing Due Date: March 27th, 2026

CYBER.ORG: AP Cybersecurity – 6.4.1 – SQL and Databases

Objective:

  • Students will:
    • Understand what SQL (Structured Query Language) is and its role in database management.
    • Learn how SQL can be used maliciously in attacks, such as SQL injections.
    • Explore how SQL can be used defensively to protect and monitor data.investigate common methods to manage access..

Standards:

CompTIA Security+ SYO-701 Objective:

2.3 Explain various types of vulnerabilities.

  • Web Based

    Guiding Question:

    What is SQL and its primary use in cybersecurity in relation to databases?

    Resources:

    • Lesson 6.4.1 – SQL and Databases.pptx and Lab 6.4.1 – SQL Queries.pptx Presentations and Lab 6.4.1 – SQL Queries activity sheet available on Google Classroom

    Assignment:

    1. Read the Lesson 6.4.1 – SQL and Databases.pptx presentation in today’s class.
    2. Complete the Lab 6.4.1 – SQL Queries Activity using the Lab 6.4.1 – SQL Queries.pptx Powerpoint Presentation and Form posted in the Google Classroom.

    Assigned: March 23rd, 2026
    Teacher Pacing Due Date: March 25th, 2026

    CYBER.ORG: AP Cybersecurity – 4.6.1 – Access Management & Case Study – Quantum Cryptography

    Objective:

    • Students will investigate common methods to manage access..

    Standards:

    CompTIA Security+ SYO-701 Objective:

    4.6 – Given a scenario, implement and maintain identity and access management

    • Provisioning/de-provisioning user accounts
    • Permission assignments and implications
    • Identity proofing
    • Federation
    • Single sign-on (SSO)
      • Lightweight Directory Access Protocol (LDAP)
      • Open authorization (OAuth)
      • Security Assertions Markup Language (SAML)
    • Interoperability
    • Attestation
    • Access controls
      • Mandatory
      • Discretionary
      • Role-based
      • Rule-based
      • Attribute-based
      • Time-of-day restrictions
      • Least privilege
    • Privileged access management tools
      • Just-in-time permissions
      • Password vaulting
      • Ephemeral credentials

    Guiding Question:

    What are some common methods to manage access?

    Resources:

    • Lesson 4.6.1 – Access Management.pptx Presentation and Case Study – Quantum Cryptography activity available on Google Classroom

    Assignment:

    1. Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
    2. Complete the Case Study – Quantum Cryptography Activity using the document and Form posted in the Google Classroom.

    Assigned: March 18th, 2026
    Teacher Pacing Due Date: March 19th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.3.1 – Types of Data and Regulations Involved

    Objective:

    Students will be able to:

    • Identify different types of data and their security needs.
    • Understand the different data classifications.
    • Explain the significance of regulatory compliance.
    • Describe key data protection laws and best practices.
    • Explain methods for securing data.

    Standards:

    CompTIA Security+ Objective(s)

    • 3.3 Compare and contrast concepts and strategies to protect data.

    Guiding Question:

    What are the different types of data and why is their classification important?

    Resources:

    • Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom

    Assignment:

    1. Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx  Microsoft PowerPoint slideshow in today’s class.
    2. Complete the CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity provided in Google Classroom. (25 pts)

    Assigned: March 16th, 2026
    Teacher Pacing Due Date: March 17th, 2026

    APCK Cyber: AP Cybersecurity – Topic 4.3 Let’s Make Secure Passwords!

    Objectives:

    • Students will be able to configure login settings for users to require industry standard security practices.

    Standards:

    • 4.3.A Describe managerial controls related to device security.
    • 4.3.D Configure login settings to make a device more secure.

    Guiding Question:

    How do we create strong passwords, and why do we need them?

    Resources:

    • 4.3 Let’s Make Secure Passwords!.pptx, 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide and 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide available on Google Classroom

    Assignment:

    1. Read through the 4.3 Let’s Make Secure Passwords!.pptx presentation in today’s class.
    2. Divide into groups of 2. You are going to try to crack various “employee passwords” based on information the employees have shared online in class today.
    3. Use the instructions and take notes in the 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide and answer the questions in the 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide. Work as a team to complete the lab by creating and cracking various types of passwords.

    Assigned: March 5th, 2026
    Teacher Pacing Due Date: March 6th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.1.5 – Methods of Authentication

    Objective:

    Students will be able to:

    • Define alternatives to passwords for authentication.
    • Demonstrate an understanding of various methods of authentication
    • Make a convincing argument as to what methods of authentication would best accomplish their assigned goal.

    Standards:

    CSTA Compatibility Standards

    • 3A-NI-06: Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
    • 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
    • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

    Guiding Question:

    What are various methods of authentication?

    Resources:

    • Lesson Slides 1.1.5 – Methods of Authentication.pptx Presentation, Activity 1.1.5 – Which Authentication Activity available on Google Classroom

    Assignment:

    1. Read the 1.1.5 – Methods of Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
    2. Complete the Activity 1.1.5 – Which Authentication Activity provided in Google Classroom. (50 pts)

    Assigned: March 4th, 2026
    Teacher Pacing Due Date: March 5th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.1.4 – Password Hashing

    Objective:

    Students will be able to:

    • Recognize authentication vocabulary terms.
    • Understand methods of secure password storage.
    • Define hashing as a method of one-way conversion.

    Standards:

    CSTA Compatibility Standards

    • 3A-NI-05 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
    • 3B-NI-04 Compare ways software developers protect devices and information from unauthorized access.

    Guiding Question:

    How are passwords stored on a system and what is password hashing?

    Resources:

    • Lesson Slides Lesson 1.1.4 – Password Hashing.pptx Presentation, Activity 1.1.4 – Hashing+Salts with CyberChef Activity and Activity 1.1.4 – Our Rainbow Table Google Sheet available on Google Classroom

    Assignment:

    1. Read the Lesson 1.1.4 – Password Hashing.pptx Microsoft PowerPoint slideshow in today’s class.
    2. Complete the Activity 1.1.4 – Hashing+Salts with CyberChef Activity using the Activity 1.1.4 – Our Rainbow Table Google Sheet provided in Google Classroom. (25 pts)

    Assigned: March 3rd, 2026
    Teacher Pacing Due Date: March 4th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.1.3 – Authentication and Password Attacks

    Objective:

    Students will be able to:

    • Define database as a collection of data organized for efficient organization and retrieval.
    • Explain 3 password guessing attack methods that use database information.

    Standards:

    CSTA Compatibility Standards

    • 3A-NI-05: Give examples to illustrate how sensitive data can be affected by malware and other attacks.
    • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

    Guiding Question:

    How can databases be used in password guessing attacks?

    Resources:

    • Lesson Slides Lesson 1.1.3 – Authentication and Password Attacks.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom

    Assignment:

    1. Read the Lesson 1.1.3 – Authentication and Password Attacks.pptx Microsoft PowerPoint slideshow in today’s class.
    2. Complete the Activity 1.1.3 – Are You at Risk Student Worksheet Lab Activity using the materials provided in Google Classroom. (25 pts)

    Assigned: March 2nd, 2026
    Teacher Pacing Due Date: March 3rd, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.1.2 Authentication

    Objective:

    Students will be able to:

    • Identify primary methods of authentication.
    • Apply best practices for creating a safe password.

    Standards:

    CSTA Compatibility Standards

    • 3A-CS-02: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
    • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

    Guiding Question:

    How do authentication and strong passwords help secure data?

    Resources:

    • Lesson Slides Lesson 1.1.2 – Authentication.pptx and Activity 1.1.2 – Creating a Safe Password.pptx Presentations available on Google Classroom

    Assignment:

    1. Read the Lesson 1.1.2 – Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
    2. Use the instructions in the Activity 1.1.2 – Creating a Safe Password.pptx presentation to complete the Activity 1.1.2 – Testing Password Strength document using the materials provided in Google Classroom. (25 pts)

    Assigned: February 27th, 2026
    Teacher Pacing Due Date: March 2nd, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.1.1 – Intro to Security Concepts

    Objective:

    Students will be able to:

    • Identify the key goals and frameworks of Cybersecurity
    • Identify the CIA triad as the characteristics of information
    • Identify the state of information as stored, transmission, and processing

    Standards:

    CSTA Compatibility Standards

    • 3A-NI-08: Explain tradeoffs when selecting and implementing cybersecurity recommendations.

    Guiding Question:

    How does the protection of the CIA triad lead to the security of data?

    Resources:

    • Lesson Slides 1.1.1 Intro to Security Concepts.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom

    Assignment:

    1. Read the Lesson 1.1.1 – Intro to Security Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
    2. Use the instructions in the Lesson 1.1.1 – Intro to Security Concepts.pptx presentation to complete the Activity 1.1.1 – CIA Triad Scenarios Worksheet using the materials provided in Google Classroom. (25 pts)

    Assigned: February 26th, 2026
    Teacher Pacing Due Date: February 27th, 2026

    It's dangerous to go alone!