Be able to explain how organizations can be more cyber resilient.
Investigate common methods to enhance Operating System security and implement monitoring measures in an enterprise.
Compare and contrast various types of security controls
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Application security
Input validation
Secure cookies
Static code analysis
Code signing
Sandboxing
Monitoring
4.5 – Given a scenario, modify enterprise capabilities to enhance security
Operating system security
Group Policy
SELinux
File integrity monitoring
DLP
Network access control (NAC)
Endpoint detection and response (EDR)/extended detection and response (XDR)
User behavior analytics
1.1 – Compare and contrast various types of controls
Category
Technical,
Managerial,
Operational,
Physical,
Control Type
Preventive
Deterrent
Detective
Corrective
Compensating
Directive
Guiding Questions:
How are applications secured?
What are some common methods for an enterprise to enhance Operating System security and implement monitoring measures?
What are some different control categories and control types?
Resources:
Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx Presentations and Security Concepts Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
Read through the Lesson 4.1.4 – Application Security.pptx, Lesson 4.5.2 – Endpoint – OS & Monitoring.pptx and Lesson 1.1.1 – Security Controls.pptx presentations in today’s class.
Complete the Security Concepts Guided Notes – Fall 2025 Form using the materials provided.
Assigned: September 30th, 2025 Teacher Pacing Due Date: October 1st, 2025
Objective: Students will begin preparing for proficiency in cyber security with an overview of computer networking fundamentals.
Topics Discussed:
APT Repository apt-cache apt-get redirection (with “|” pipe) CTRL + C (break) options/flags cat nano tar archive chmod perl
Resources:
PowerPoint presentation: Lab – Fun With Linux
PDF document: Linux Commands Cheat Sheet.pdf
Assignment:
Begin reading the Lab – Fun With Linux presentation to have a little fun while practicing with commands in the Linux operating system.
This lab will introduce you to the APT Repository, an open source collection of apps, games and utilities that can be downloaded and used in Linux for free.
Notice that the games and utilities that you will encounter in today’s lab use many of the commands and techniques that we have been studying over the past week!
To complete today’s Lab activity, upload a screenshot of your ASCII aquarium to today’s Google Classroom assignment post!
Bonus: On today’s assignment post, you will find the promised Linux Commands Cheat Sheet! Download it, and use it in good health.
Assigned: September 24th, 2025 Teacher Pacing Due Date: September 25th, 2025
Read the Lab – Linux 102 to review advanced Linux commands within the Linux operating system.
Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentation, and practice or test the commands as you read about them.
The Lab – Linux 102 presentation will introduce advanced options and flags, searching for text strings using find and grep, changing file ownership and permissions, and gaining “super user” privileges with the sudo command, among other topics.
We will work on this Lab today and tomorrow, and will conclude with a final Linux activity on Wednesday that will be due on Friday.
As proof of completion of the Linux 102 Lab, upload a screenshot of the custom log commands you created on the syslog (On Your Own) slide, as verified by displaying the last 10 lines of the syslog (demonstrated in the presentation).
Assigned: September 22nd, 2025 Teacher Pacing Due Date: September 24th, 2025
Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.
Resources:
See PowerPoint presentations: Lab – Linux 101
Assignment:
Read the Lab – Linux 101 to review fundamental Linux commands within the Linux operating system.
Use the Terminal app in your Kali Linux virtual environment in the CYBER.ORG Cyber Range to follow along with the presentations, and practice or test the commands as you read about them.
Begin reading the Lab – Linux 101 presentation to study the fundamentals of the Linux operating system. I will show you how to do some of the steps (Watch) and we will do some of the steps together (Together). Then, you will need to follow the steps listed on each “On Your Own” slide, being careful not to skip any steps.
To demonstrate completion of this Lab Activity, upload three screenshots to today’s Assignment Post in the Google Classroom:
The Terminal window from slide 24 that shows the results of the rm -rf command
The Terminal window from the On Your Own exercise on Slide 30 displaying the results of the Move/Copy Files sequence
The Terminal window displaying the results of the -v option when used with both of the directory commands introduced on slide 36 of the Lab presentation.
Assigned: September 15th, 2025 Teacher Pacing Due Date: September 16th, 2025
Students will be able to summarize authentication and authorization design concepts.
Standards:
CompTIA Security+ SYO-701 Objective:
1.2 – Summarize fundamental security concepts
Guiding Question:
How do the principles of the CIA Triad interact with authentication, authorization, and accounting framework to ensure the overall security of information systems?
Resources:
Lesson 1.2.1 – CIA Triad and AAA.pptx Presentation available on Google Classroom
Assignment:
Read through the Lesson 1.2.1 – CIA Triad and AAA.pptx presentation in today’s class.
Complete the in-class Activity using the materials provided.
Assigned: September 9th, 2025 Teacher Pacing Due Date: September 9th, 2025
Students will be able to analyze a cyber attack, including identifying the phases of the attack, internalizing key learnings for future protection, and sharing an analysis of the attack with a non-technical audience.
Standards:
1.1.A Describe types of adversaries and their motivations.
1.1.B Determine the type of attack used by a cyber adversary.
1.1.C Determine the phases used in a cyber attack.
Guiding Question:
What are the common elements of a Cyber Attack?
Resources:
1.1 Analyzing Cyber Attacks PPT.pptx Presentation available on Google Classroom
Assignment:
Read through the 1.1 Analyzing Cyber Attacks PPT.pptx presentation in today’s class.
Divide into groups of 2 – 3, your group will receive a specific historical cyber attack to research.
Work as a team to complete the Cyber Attacks Case Study Analysis document available in the Google Classroom to research your assigned attack.
You will be using the information your group collects on this graphic organizer to write a brief synopsis of your assigned attack including:
Who the adversaries carrying out the attack were,
How the attack happened
What the impact of the attack was
Who was impacted
You will be sharing your information with the class on Monday via a 3–5-minute presentation.
Many other information sources for these attacks are available beyond the provided articles. You are encouraged to use any and all resources available to you to go beyond the provided resources.
Presentations will take place during Monday’s class meeting, and each team member will be expected to contribute, so prepare your materials accordingly.
Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.
Standards:
CompTIA Security+ SYO-701 Objective: 5.2 – Explain elements of the risk management process
Guiding Question:
What are the factors used when calculating risk and how do you assign a value to risk?
Resources:
5.2.1 – Risk Management.pptx Presentation available on Google Classroom
Assignment:
Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.
Assigned: August 29th, 2025 Teacher Pacing Due Date: August 29th, 2025