CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Mitigation Techniques

Objective:

  • Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.

Standards:

CompTIA Security+ SYO-701 Objective:

2.5 – Explain the purpose of mitigation techniques used to secure the enterprise

  • Segmentation
  • Access control
    • Access control list (ACL)
    • Permissions
  • Application allow list
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least privilege
  • Configuration enforcement
  • Decommissioning

Guiding Question:

What are common mitigation techniques that can be used to secure the enterprise?

Resources:

  • Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Mitigation Techniques.pptx presentation in today’s class.
  2. Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom.

Assigned: January 5th, 2025
Teacher Pacing Due Date: January 6th, 2025