Students will be able to configure access control settings on a Linux-based system.
Standards:
CompTIA SY0-701 Objectives:
• 4.6.1 – Provisioning/de-provisioning user accounts
Guiding Question:
Why are access controls important, and why do we need them?
Resources:
5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom
Assignment:
Read through the 5.2 Setting Access Controls.pptxpresentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.
Assigned: March 26th, 2026 Teacher Pacing Due Date: March 27th, 2026
Understand what SQL (Structured Query Language) is and its role in database management.
Learn how SQL can be used maliciously in attacks, such as SQL injections.
Explore how SQL can be used defensively to protect and monitor data.investigate common methods to manage access..
Standards:
CompTIA Security+ SYO-701 Objective:
2.3 Explain various types of vulnerabilities.
Web Based
Guiding Question:
What is SQL and its primary use in cybersecurity in relation to databases?
Resources:
Lesson 6.4.1 – SQL and Databases.pptx and Lab 6.4.1 – SQL Queries.pptx Presentations and Lab 6.4.1 – SQL Queries activity sheet available on Google Classroom
Assignment:
Read the Lesson 6.4.1 – SQL and Databases.pptx presentation in today’s class.
Complete the Lab 6.4.1 – SQL Queries Activity using the Lab 6.4.1 – SQL Queries.pptx Powerpoint Presentation and Form posted in the Google Classroom.
Assigned: March 23rd, 2026 Teacher Pacing Due Date: March 25th, 2026
Identify different types of data and their security needs.
Understand the different data classifications.
Explain the significance of regulatory compliance.
Describe key data protection laws and best practices.
Explain methods for securing data.
Standards:
CompTIA Security+ Objective(s)
3.3 Compare and contrast concepts and strategies to protect data.
Guiding Question:
What are the different types of data and why is their classification important?
Resources:
Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom
Assignment:
Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theCFU Activity 1.3.1 – Types of Data and Regulations InvolvedActivity provided in Google Classroom. (25 pts)
Assigned: March 16th, 2026 Teacher Pacing Due Date: March 17th, 2026
Students will be able to configure login settings for users to require industry standard security practices.
Standards:
4.3.A Describe managerial controls related to device security.
4.3.D Configure login settings to make a device more secure.
Guiding Question:
How do we create strong passwords, and why do we need them?
Resources:
4.3 Let’s Make Secure Passwords!.pptx, 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide and 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide available on Google Classroom
Assignment:
Read through the 4.3 Let’s Make Secure Passwords!.pptxpresentation in today’s class.
Divide into groups of 2. You are going to try to crack various “employee passwords” based on information the employees have shared online in class today.
Use the instructions and take notes in the 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide and answer the questions in the 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide. Work as a team to complete the lab by creating and cracking various types of passwords.
Assigned: March 5th, 2026 Teacher Pacing Due Date: March 6th, 2026
3A-NI-05 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04 Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How are passwords stored on a system and what is password hashing?
Resources:
Lesson Slides Lesson 1.1.4 – Password Hashing.pptx Presentation, Activity 1.1.4 – Hashing+Salts with CyberChef Activity and Activity 1.1.4 – Our Rainbow Table Google Sheet available on Google Classroom
Assignment:
Read the Lesson 1.1.4 – Password Hashing.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.4 – Hashing+Salts with CyberChef Activity using the Activity 1.1.4 – Our Rainbow Table Google Sheet provided in Google Classroom. (25 pts)
Assigned: March 3rd, 2026 Teacher Pacing Due Date: March 4th, 2026
Define database as a collection of data organized for efficient organization and retrieval.
Explain 3 password guessing attack methods that use database information.
Standards:
CSTA Compatibility Standards
3A-NI-05: Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How can databases be used in password guessing attacks?
Resources:
Lesson Slides Lesson 1.1.3 – Authentication and Password Attacks.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.3 – Authentication and Password Attacks.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.3 – Are You at Risk Student Worksheet Lab Activity using the materials provided in Google Classroom. (25 pts)
Assigned: March 2nd, 2026 Teacher Pacing Due Date: March 3rd, 2026
Apply best practices for creating a safe password.
Standards:
CSTA Compatibility Standards
3A-CS-02: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How do authentication and strong passwords help secure data?
Resources:
Lesson Slides Lesson 1.1.2 – Authentication.pptx and Activity 1.1.2 – Creating a Safe Password.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.2 – Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Activity 1.1.2 – Creating a Safe Password.pptx presentation to complete theActivity 1.1.2 – Testing Password Strength document using the materials provided in Google Classroom. (25 pts)
Assigned: February 27th, 2026 Teacher Pacing Due Date: March 2nd, 2026
Identify the key goals and frameworks of Cybersecurity
Identify the CIA triad as the characteristics of information
Identify the state of information as stored, transmission, and processing
Standards:
CSTA Compatibility Standards
3A-NI-08: Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Guiding Question:
How does the protection of the CIA triad lead to the security of data?
Resources:
Lesson Slides 1.1.1 Intro to Security Concepts.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.1 – Intro to Security Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 1.1.1 – Intro to Security Concepts.pptx presentation to complete theActivity 1.1.1 – CIA Triad Scenarios Worksheet using the materials provided in Google Classroom. (25 pts)
Assigned: February 26th, 2026 Teacher Pacing Due Date: February 27th, 2026