Objective:
Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.
Standards:
CompTIA Security+ SYO-701 Objective: 2.5 – Explain the purpose of mitigation techniques used to secure the enterprise
Segmentation
Access control
Access control list (ACL)
Permissions
Application allow list
Isolation
Patching
Encryption
Monitoring
Least privilege
Configuration enforcement
Decommissioning
Guiding Question:
What are common mitigation techniques that can be used to secure the enterprise?
Resources:
Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.5.1 – Mitigation Techniques .pptx presentation in today’s class.
Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom .
Assigned: January 5th, 2025 Teacher Pacing Due Date: January 6th, 2025
Objective: Demonstrate current levels knowledge in Cybersecurity Principles through completion of an assessment.
Resources:
Assignment:
Assigned: December 15th, 202 5Teacher Pacing Due Date: December 15th, 2025
Objective:
Students will be able to implement secure network designs.
Standards:
CompTIA Security+ SYO-701 Objective: 3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
Infrastructure considerations
Network Appliances
Jump Server
Proxy Server
Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
Load balancer
Sensors
Guiding Question:
How are network appliances secured?
Resources:
Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.2.2 – Network Appliances .pptx presentation in today’s class.
Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom .
Assigned: December 12th, 2025 Teacher Pacing Due Date: December 15th, 2025
Objective:
Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.
Standards:
CompTIA Security+ SYO-701 Objective: 4.5 – Given a scenario, modify enterprise capabilities to enhance security
Firewalls
Rules
Access lists
Ports/protocols
Screened subnets
IDS/IPS
Web filter
Agent-based
Centralized proxy
Universal Resource Locator (URL) scanning
Content categorization
Block rules
Reputation
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter .pptx presentation in today’s class.
Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom .
Assigned: December 11th, 2025 Teacher Pacing Due Date: December 12th, 2025
Objective:
Students will compare various types of infrastructure security systems.
Standards:
CompTIA Security+ SYO-701 Objective: 3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
Infrastructure considerations
Device placement
Security zones
Attack surface
Connectivity
Failure modes
Device attribute
Active vs passive
Inline vs tap/monitor
Port security
802.1X
Extensible Authentication Protocol (EAP)
Firewall types
Web application firewall (WAF)
Unified threat management (UTM)
Next-generation firewall (NGFW)
Layer 4/Layer 7
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.2.1 – Infrastructure Considerations .pptx presentation in today’s class.
Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom .
Assigned: December 10th, 2025 Teacher Pacing Due Date: December 11th, 2025
Objective:
Students will analyze common architecture considerations.
Standards:
CompTIA Security+ SYO-701 Objective: 3.1 – Compare and contrast security implications of different architecture models
Considerations
Availability
Resilience
Cost
Responsiveness
Scalability
Risk transference
Ease of recovery
Patch availability
Inability to patch
Power
Compute
Guiding Question:
What are common architecture considerations?
Resources:
Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.1.2 – Architecture Considerations .pptx presentation in today’s class.
Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom .
Assigned: December 9th, 2025 Teacher Pacing Due Date: December 10th, 2025
Objective:
Students will investigate mobile solutions.
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Mobile solutions
Mobile device management (MDM)
Deployment models
Bring your own device (BYOD)
Corporate-owned, personally enabled (COPE)
Choose your own device (CYOD)
Connection methods
Guiding Question:
What are common mobile solutions?
Resources:
Assignment:
Read the Lesson 4.1.3 – Mobile Solutions .pptx presentation in today’s class.
Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 8th, 2025 Teacher Pacing Due Date: December 9th, 2025
Objective:
Students will analyze potential supply chain issues and how to mitigate them.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Supply chain
Service provider
Hardware provider
Software provider
Cryptographic
Misconfiguration
Mobile device
Side loading
Jailbreaking
Zero-day
Guiding Question:
What are common supply chain issues and how can they be mitigated?
Resources:
Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 5th, 2025 Teacher Pacing Due Date: December 8th, 2025
Objective:
Students will analyze potential indicators associated with hardware and virtualization vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Hardware
Firmware
End-of-life
Legacy
Virtualization
Virtual machine (VM) escape
Resource reuse
Cloud-specific
Guiding Question:
What are hardware and virtualization vulnerabilities and how can they be mitigated?
Resources:
Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – VENOM Vulnerability.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 4th, 2025 Teacher Pacing Due Date: December 5th, 2025
Objective:
Students will analyze potential indicators associated with vulnerabilities in operating system and web-based attacks.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Operating system (OS)-based
Web-based
Structured Query Language injection (SQLi)
Cross-site scripting (XSS)
Guiding Question:
What are some vulnerabilities in operating systems and web applications that can lead to malicious attacks?
Resources:
Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx and Lab – XSS DVWA.pptx Presentations available on Google Classroom
Assignment:
Review the Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx presentation , if necessary.
Complete the Lab – XSS DVWA.pptx Activity in class using the materials provided in Google Classroom .
To confirm completion the lab activity, upload a screenshot displaying the Session ID (PHPSESSID) using the XSS (Reflected) Vulnerability attack to today’s Google Classroom post.
Assigned: December 3rd, 2025 Teacher Pacing Due Date: December 4th, 2025
Posts navigation
It's dangerous to go alone!