Identify common cryptographic flaws and vulnerabilities in various systems.
Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
Analyze case studies of real-world cryptographic breaches to understand their impact.
Evaluate the effectiveness of different cryptographic algorithms and protocols.
Recommend best practices for securing cryptographic implementations in applications.
Standards:
CompTIA Security+ Objective(s):
3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.
2.4 Given a scenario, analyze indicators of malicious activity.
Downgrade
Collision
Birthday
Guiding Question:
How does cryptography and encryption protect our daily digital interactions and ensure the security of information?
Resources:
Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom
Assignment:
Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptxpresentation in today’s class.
Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).
Assigned: April 20th, 2026 Teacher Pacing Due Date: April 21st, 2026
Understand the basic concepts of cryptography and encryption.
Identify common uses of encryption in daily life.
Explain the importance of encryption in securing information.
Analyze case studies of encryption in action.
Demonstrate the use of basic encryption tools or methods.
Standards:
CSTA Standard: 3B-NI-04 – Compare ways software developers protect devices and information fromunauthorized access.
Guiding Question:
How does cryptography and encryption protect our daily digital interactions and ensure the security of information?
Resources:
Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx and Lab 2.5.1 – Caesar and GPG.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom
Assignment:
Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptxpresentation in today’s class.
Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
Hand in the completed Lab 2.5.1 – Caesar and GPG Activity Form to complete the lab (50 pts).
Assigned: April 16th, 2026 Teacher Pacing Due Date: April 17th, 2026
Be able to explain the fundamental concepts of hashing and its historical development in computer science.
Identify and compare various hash functions, including MD5, SHA-1, SHA-2, and SHA-3, along with their applications and vulnerabilities.
Discuss the role of hashing in data integrity, security, and modern technologies such as blockchain.
Evaluate the implications of current challenges in hashing and consider future trends in cryptography, especially in the context of quantum computing.
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions
Hashing
Salting
Guiding Question:
What are the different types of encryption?
Resources:
Lesson 2.3.1 – Hashing Past and Present.pptx and Lab 2.3.1 – Hashing.pptx presentations and Lab 2.3.1 – Hashing Activity sheet available on Google Classroom
Assignment:
Read the Lesson 2.3.1 – Hashing Past and Present.pptxpresentation in today’s class.
Complete the Lab 2.3.1 – HashingActivity Form using the Lab 2.3.1 – Hashing.pptx Powerpoint Presentation posted in the Google Classroom.
Hand in the completed Lab 2.3.1 – Hashing Activity Form to complete the lab (50 pts).
Assigned: April 15th, 2026 Teacher Pacing Due Date: April 16th, 2026
Be able to distinguish between block and stream ciphers.
Explain how block and stream ciphers operate.
Be able to provide examples of where these ciphers would be used.
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions
Guiding Question:
How are ciphers categorized in today’s usage and how are they used for the protection of data?
Resources:
Lesson 2.2.1 – Cipher Types and Early Examples.pptx and Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx presentations and Lab 2.2.1 – Encrypting with ChaCha20 and AES form available on Google Classroom
Assignment:
Read the Lesson 2.2.1 – Cipher Types and Usage.pptxpresentation in today’s class.
Complete the Lab 2.2.1 – Encrypting with ChaCha20 and AES Activity form using the Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx Powerpoint Presentation posted in the Google Classroom.
Assigned: April 13th, 2026 Teacher Pacing Due Date: April 14th, 2026
Examine cryptography vocabulary terms and methods of encryption.
Identify cryptographic algorithms and define how they can be used to help improve security.
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions
Guiding Question:
How have various cryptography methods been used from ancient history to modern day to protect vital information?
Resources:
Lesson 4.2.1 – Cryptography Concepts.pptx presentation and Activity 4.2.1 – Breaking Ciphers form available on Google Classroom
Assignment:
Read the Lesson 4.2.1 – Cryptography Concepts.pptx presentation in today’s class.
Complete the Activity 4.2.1 – Breaking Ciphers Activity using the form posted in the Google Classroom. Solve the Ciphers and hand in the completed form to complete the Lab Activity (50 pts).
Assigned: April 10th, 2026 Teacher Pacing Due Date: April 13th, 2026
Students will be able to apply asymmetric encryption algorithms to encrypt and decrypt data.
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions.
Encryption
Asymmetric
Symmetric
Key exchange
Algorithms
Guiding Question:
How does Assymetric Cryptography power modern communications?
Resources:
5.4 Asymmetric Cryptography.pptx and 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide available on Google Classroom
Assignment:
Read through the 5.4 Asymmetric Cryptography.pptxpresentation in today’s class. We will use the information in the presentation along with what we learned yesterday about Asymmetric Cryptography to complete an in-class Lab Activity.
Follow the instructions provided in the 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide in today’s Google Classroom Assignment Post to complete the lab activity.
Assigned: April 9th, 2026 Teacher Pacing Due Date: April 10th, 2026
Identify the strengths of using asymmetric encryption
Explain the steps involved with asymmetric encryption
Standards:
CompTIA Security+ Objective(s)
1.4 Explain the importance of using appropriate cryptographic solutions.
Public key infrastructure (PKI)
Public key
Private key
Key escrow
Encryption
Asymmetric
Key exchange
Algorithms
Key length
Guiding Question:
How does asymmetric encryption allow the protection of sensitive information without the difficulty of sharing secret keys?
Resources:
Lesson 10.1.2 – Asymmetric Encryption.pptx presentation and Activity 10.1.2- Investigating RSA keypairs form available on Google Classroom
Assignment:
Read the Lesson 10.1.2 – Asymmetric Encryption.pptx presentation in today’s class.
Choose a partner and complete Part A of the Activity 10.1.2- Investigating RSA keypairs Google Form provided in the Google Classroom. Answer the three Part A: Closing questions for discussion in your form.
Proceed to Part B, and paste a screenshot of the decrypted message received from your partner in Cyberchef into the Form to complete the lab. (50 pts)
Assigned: April 8th, 2026 Teacher Pacing Due Date: April 9th, 2026
Identify the importance of using encryption policies when sending information
Explain the steps involved with symmetric encryption
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions
Encryption
Symmetric
Key exchange
Algorithms
Key length
Tools
Trusted Platform Module (TPM)
Guiding Question:
How does encryption protect against a loss of confidentiality of sensitive information and what steps are involved in symmetric encryption?
Resources:
Lesson 10.1.1 – Symmetric Encryption.pptx presentation and Activity 10.1.1 – Creating a Key Exchange Method form available on Google Classroom
Assignment:
Read the Lesson 10.1.1 – Symmetric Encryption.pptx presentation in today’s class.
Choose a partner and complete Part 1 of the Activity 10.1.1 – Creating a Key Exchange Method Google Form provided in the Google Classroom.
We will go around the room describing the “Key Exchange” solutions devised by our groups and assess their strengths and weaknesses. Use the in-class discussion to complete Part 2 of the Activity and hand in the completed Activity form for credit (50 points)
Assigned: April 6th, 2026 Teacher Pacing Due Date: April 7th, 2026
1.4 – Explain the importance of using appropriate cryptographic solutions
Encryption
Level
Full-disk
Partition
File
Volume
Database
Record
Transport/communication
Asymmetric
Symmetric
Key exchange
Algorithms
Key length
Guiding Question:
What are the different types of encryption?
Resources:
Lesson 1.4.2 – Encryption.pptx and Lab 1.4.2 – Linux Personal File Encryption.pptx presentations available on Google Classroom
Assignment:
Read the Lesson 1.4.2 – Encryption.pptx presentation in today’s class.
Complete the Lab 1.4.2 – Linux Personal File Encryption Activity using the Lab 1.4.2 – Linux Personal File Encryption.pptx Powerpoint Presentation posted in the Google Classroom.
To confirm completion of today’s Lab activity, post screenshots of the results of the Your Turn slide 13 (where you will share a simple .zip encrypted message with your partner) and slide 20 (where you will share an encrypted message with a shared key with your partner) to today’s Google Classroom assignment. Make sure your screenshots demonstrate the message received from your partner and the software you used to open the encrypted message.
Assigned: April 1st, 2026 Teacher Pacing Due Date: April 2nd, 2026
Students will be able to configure access control settings on a Linux-based system.
Standards:
CompTIA SY0-701 Objectives:
• 4.6.1 – Provisioning/de-provisioning user accounts
Guiding Question:
Why are access controls important, and why do we need them?
Resources:
5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom
Assignment:
Read through the 5.2 Setting Access Controls.pptxpresentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.
Assigned: March 26th, 2026 Teacher Pacing Due Date: March 27th, 2026