I can complete a physical security-related icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Cybersecurity
Physical Security
Assignment:
Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to complete a Physical Security thought exercise.
The scenario is this: In the kingdom of Far, Far Away, you are the Security Chief of the Royal Museum, appointed by the Queen herself to guard her most precious possession: Her Majesty’s Royal Crown – a priceless artifact made of the most precious metals, jewels and fabrics, and a symbol of the wealth, power and dignity of the royal family.
However, as a monarch of the People, the Queen wants to ensure that everyone can view and enjoy the magnificence of the Royal Crown.
Of course, there are those who would love to make the Crown their own, and would go through great lengths to steal it. As such, she has tasked you with designing a building, outfitted with the latest in security measures, to prevent this from happening.
Grab a partner, and put your heads together to design the most secure facility imaginable, and help Her Majesty protect the Crown! Remember: You have to let people in, but you only have to let them see – not touch- the Crown! Think about all the ways someone might try to steal the Crown, and how you might stop them!
Use the provided paper, pencils, pens and markers to sketch out your super secure Crown viewing facility, and be prepared to present and explain your security configuration to the class, and at the end, we’ll vote on the most secure facility!
Good Luck! The Queen’s most precious possession and the dignity of the Royal Family is in your hands!
I can understand and agree to abide by the Computer Lab and Internet Usage Policy for the Center for Computer Studies measured by the returned signature page bearing my and my parents’ or guardian’s signatures, so that the classroom and network remains a safe and secure place for us to work, learn and play.
By now, you’ve been using computers in school long enough that you should have a pretty good handle on what is an acceptable use of computer equipment and the Internet, and what isn’t acceptable. Today’s presentation will eliminate any doubt or confusion as to what is and isn’t acceptable here in the lab.
Watch the Usage Policy Presentation along with me, and feel free to ask any questions you may have on the policy.
This policy is also outlined on the Plan for Success that you will receive today. Please read the Plan for Success, and sign on the last two pages to confirm that you agree to abide by the policies, then take it home and show it to your parents/guardians, and have them sign to confirm that they understand and agree to the policy. Please return the document with all required signatures to me by Monday, August 11th.
The policies make sure that this room remains a clean and functional place for everyone to live and learn in. We can’t get much accomplished in here unless everyone can agree to abide by them. If you can live with that, then we can move on to learning the good stuff.
I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Cybersecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.
Use the provided materials to make a tri-fold “Name Tag” that will help me learn your name.
Let’s play “Two Truths and a Lie!” On the back of your name tag, write three complete sentences about yourself: Two of which are true, and one that is a complete lie!
We’re going to go around the room and give each class member a chance to introduce themselves, and share their Two Truths and a Lie, then the rest of the class and I will try to guess which of the statements is the lie! Don’t make it too obvious or easy! Stump me if you can!
I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.
Links: None.
Topics Discussed:
Cybersecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for AP Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Take a look around! I’ll explain everything here very soon.
Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret word: “Steganography“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.
Complete the TestOut B.2.7 Practice Test: CompTIA Network+ N10-009 assessment provided in the TestOut Labsim Courseware by the end of the class period today.
This exam tests your understanding of domain objectives studied throughout the course, including Networking Concepts, Networking Implementation, Network Operations, Network Security and Network Troubleshooting.
Please put away all electronic devices, notes and other resources. Do not open any browser windows or tabs besides the TestOut Labsim Courseware. Please remain silent until the end of the testing session.
The exam contains 90 multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
You have fifty minutes to complete the test. You must submit your test answers before the end of the class period.
The Domain Name System (DNS) is critical for locating services and hosts on the Internet and on corporate networks. SOHO and enterprise Linux and Windows systems usually rely on DNS server infrastructure for name resolution and service discovery. In the absence of DNS servers, network client machines will be unable to log on or connect to services or servers. DNS problems can also affect external websites and services. As a network technician, you will often be called upon to troubleshoot issues with name resolution.
Text Lessons:
6.6.2 Name Resolution Issues
Text and Video Lessons:
6.6.1 Client DNS Issues (00:52 minutes)
6.6.3 nslookup (3:39 minutes)
6.6.4 dig (5:29 minutes)
Lab/Activity:
6.6.5 Lab: Explore nslookup
6.6.6 Lab: Use nslookup
Quiz/Assessment:
6.6.7 Lesson Review (10 questions)
Topics Discussed:
What are the symptoms of name resolution problems?
What is the role of the HOSTS file in the name resolution process?
What is the difference between nslookup and dig?
Assignment:
Access the TestOut Courseware through the provided link.
Study Lesson 6.6: DNS Troubleshooting and complete the 6.6.5 Lab: Explore nslookup, 6.6.6 Lab: Use nslookup, and the 10 question 6.6.7 Lesson Review Exam to complete the Section.
Assigned: May 8th, 2025 Teacher Pacing Due Date: May 9th, 2025
Each host that has an IP address assigned to it can also have a descriptive name. This makes it easier for human users to identify and access it on the network and for application services to be configured with an addressing scheme that allows for changes in the underlying network. Almost all networks depend on this name resolution functionality to operate smoothly and securely, so it is important to understand how it works. In this topic, you will identify methods for host name resolution for TCP/IP networks.
Text Lessons:
6.5.1 Host Names and Domain Names
6.5.2 DNS Hierarchy
6.5.3 Name Resolution Using DNS
6.5.4 Resource Record Types
6.5.5 Host Address and Canonical Name Records
6.5.6 Mail Exchange, Service, and Text Records
6.5.7 Pointer Records
6.5.9 Internal vs External DNS
Text and Video Lessons:
6.5.8 DNS Server Configuration (11:37 minutes)
6.5.10 DNS Security (4:24 minutes)
6.5.16 Configuring DNS Caching on Linux Demo (4:24 minutes)
Lab/Activity:
6.5.11 Lab: Configure DNS Addresses
6.5.12 Lab: Create Standard DNS Zones
6.5.13 Lab: Create Host Records
6.5.14 Lab: Create CNAME Records
6.5.15 Lab: Troubleshoot DNS Records
Quiz/Assessment:
6.5.17 Lesson Review (15 questions)
Topics Discussed:
How do Domain Name Service (DNS) queries resolve host names and domains to IP addresses?
What is the role of the root servers in the DNS hierarchy?
In DNS, what is the difference between a zone and a domain?
What is the difference between a forward lookup zone and a reverse lookup zone?
What functions do different record types have, such as A records and PTR records?
What methods can be used to ensure the security of name queries?
Assignment:
Access the TestOut Courseware through the provided link.
Study Lesson 6.5: Domain Name System and complete the 6.5.11 Lab: Configure DNS Addresses, 6.5.12 Lab: Create Standard DNS Zones, 6.5.13 Lab: Create Host Records, 6.5.14 Lab: Create CNAME Records, 6.5.15 Lab: Troubleshoot DNS Records, and the 15 question 6.5.17 Lesson Review Exam to complete the Section.
Assigned: May 6th, 2025 Teacher Pacing Due Date: May 8th, 2025