All posts by mistermarmolejo

CYBER.ORG: AP Cybersecurity – Lesson 3.2.2 – Network Appliances

Objective:

  • Students will be able to implement secure network designs.

Standards:

CompTIA Security+ SYO-701 Objective:

3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Network Appliances
      • Jump Server
      • Proxy Server
      • Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
      • Load balancer
      • Sensors

Guiding Question:

How are network appliances secured?

Resources:

  • Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.2 – Network Appliances.pptx presentation in today’s class.
  2. Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom.

Assigned: December 12th, 2025
Teacher Pacing Due Date: December 15th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter

Objective:

  • Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.

Standards:

CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Firewalls
    • Rules
    • Access lists
    • Ports/protocols
    • Screened subnets
  • IDS/IPS
    • Trends
    • Signatures
  • Web filter
    • Agent-based
    • Centralized proxy
    • Universal Resource Locator (URL) scanning
    • Content categorization
    • Block rules
    • Reputation

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx presentation in today’s class.
  2. Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom.

Assigned: December 11th, 2025
Teacher Pacing Due Date: December 12th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.2.1 – Infrastructure Considerations

Objective:

  • Students will compare various types of infrastructure security systems.

Standards:

CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Device placement
    • Security zones
    • Attack surface
    • Connectivity
    • Failure modes
      • Fail-open
      • Fail-closed
    • Device attribute
      • Active vs passive
      • Inline vs tap/monitor
    • Port security
      • 802.1X
      • Extensible Authentication Protocol (EAP)
    • Firewall types
      • Web application firewall (WAF)
      • Unified threat management (UTM)
      • Next-generation firewall (NGFW)
      • Layer 4/Layer 7

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.1 – Infrastructure Considerations.pptx presentation in today’s class.
  2. Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom.

Assigned: December 10th, 2025
Teacher Pacing Due Date: December 11th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.1.2 – Architecture Considerations

Objective:

  • Students will analyze common architecture considerations.

Standards:

CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models

  • Considerations
    • Availability
    • Resilience
    • Cost
    • Responsiveness
    • Scalability
    • Risk transference
    • Ease of recovery
    • Patch availability
    • Inability to patch
    • Power
    • Compute

Guiding Question:

What are common architecture considerations?

Resources:

  • Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.1.2 – Architecture Considerations.pptx presentation in today’s class.
  2. Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom.

Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.3 – Mobile Solutions

Objective:

  • Students will investigate mobile solutions.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Mobile solutions
    • Mobile device management (MDM)
    • Deployment models
      • Bring your own device (BYOD)
      • Corporate-owned, personally enabled (COPE)
      • Choose your own device (CYOD)
    • Connection methods
      • Cellular
      • Wi-Fi
      • Bluetooth

Guiding Question:

What are common mobile solutions?

Resources:

  • Lesson 4.1.3 – Mobile Solutions.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
  2. Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities

Objective:

  • Students will analyze potential supply chain issues and how to mitigate them.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Supply chain
    • Service provider
    • Hardware provider
    • Software provider
  • Cryptographic
  • Misconfiguration
  • Mobile device
    • Side loading
    • Jailbreaking
  • Zero-day

Guiding Question:

What are common supply chain issues and how can they be mitigated?

Resources:

  • Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with hardware and virtualization vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Hardware
    • Firmware
    • End-of-life
    • Legacy
  • Virtualization
    • Virtual machine (VM) escape
    • Resource reuse
  • Cloud-specific

Guiding Question:

What are hardware and virtualization vulnerabilities and how can they be mitigated?

Resources:

  • Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – VENOM Vulnerability.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 4th, 2025
Teacher Pacing Due Date: December 5th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2, Pt. 2 – Cross-site Scripting (XSS) Lab

Objective:

  • Students will analyze potential indicators associated with vulnerabilities in operating system and web-based attacks.

Standards:

CompTIA Security+ SYO-701 Objective:

2.3 – Explain various types of vulnerabilities

  • Operating system (OS)-based
  • Web-based
    • Structured Query Language injection (SQLi)
    • Cross-site scripting (XSS)

Guiding Question:

What are some vulnerabilities in operating systems and web applications that can lead to malicious attacks?

Resources:

  • Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx and Lab – XSS DVWA.pptx Presentations available on Google Classroom

Assignment:

  1. Review the Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx presentation, if necessary.
  2. Complete the Lab – XSS DVWA.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying the Session ID (PHPSESSID) using the XSS (Reflected) Vulnerability attack to today’s Google Classroom post.

Assigned: December 3rd, 2025
Teacher Pacing Due Date: December 4th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2 – OS and Web-based Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with vulnerabilities in operating system and web-based attacks.

Standards:

CompTIA Security+ SYO-701 Objective:

2.3 – Explain various types of vulnerabilities

  • Operating system (OS)-based
  • Web-based
    • Structured Query Language injection (SQLi)
    • Cross-site scripting (XSS)

Guiding Question:

What are some vulnerabilities in operating systems and web applications that can lead to malicious attacks?

Resources:

  • Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx and Lab – SQL Injection DVWA.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx presentation, in today’s class.
  2. Complete the Lab – SQL Injection DVWA.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying the user information from the Victim Website, including the hashed passwords, generated using a successful SQL Injection attack to today’s Google Classroom post.

Assigned: December 2nd, 2025
Teacher Pacing Due Date: December 3rd, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.4 – Application Security

Objective:

  • Students will investigate methods to secure applications.

Standards:

CompTIA Security+ SYO-701 Objective:


4.1 – Given a scenario, apply common security techniques to computing

  • Application security
    • Input validation
    • Secure cookies
    • Static code analysis
    • Code signing
  • Sandboxing
  • Monitoring

Guiding Question:

  • How are applications secured?

Resources:

Lesson 4.1.4 – Application Security.pptx Presentation and Lesson 4.1.4 – Application Security – Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the Lesson 4.1.4 – Application Security.pptx presentation in today’s class.
  2. Complete the Lesson 4.1.4 – Application Security – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: December 1st, 2025
Teacher Pacing Due Date: December 2nd, 2025