Tag Archives: AP Cybersecurity

CYBER.ORG: AP Cybersecurity – Topic 1.2C – Managing Risk

Objective:

  • Students will be able to explain how organizations can be more cyber resilient.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.CS.LOSS- Develop a plan for risk mitigation that implements redundancy.
  • CSTA Compatibility Standards
    • 3A-DA-10: Evaluate the tradeoffs in how data elements are organized and where data is stored.

    Guiding Question:

    How can organizations prepare for and recover from cyber incidents to protect their core purpose?

    Resources:

    • Lesson PPT Cybersecurity 1.2.C.pptx Presentation and Lab 1.2.C – Remote Backups.pptx available on Google Classroom

    Assignment:

    1. Read through the Lesson PPT Cybersecurity 1.2.C.pptx presentation in today’s class.
    2. Complete the Lab 1.2.C – Remote Backups using the materials provided.

    Assigned: September 10th, 2025
    Teacher Pacing Due Date: September 12th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 1.2.1 – CIA Triad and AAA

    Objective:

    • Students will be able to summarize authentication and authorization design concepts.

    Standards:

    • CompTIA Security+ SYO-701 Objective:
      • 1.2 – Summarize fundamental security concepts

    Guiding Question:

    How do the principles of the CIA Triad interact with authentication, authorization, and accounting framework to ensure the overall security of information systems?

    Resources:

    • Lesson 1.2.1 – CIA Triad and AAA.pptx Presentation available on Google Classroom

    Assignment:

    1. Read through the Lesson 1.2.1 – CIA Triad and AAA.pptx presentation in today’s class.
    2. Complete the in-class Activity using the materials provided.

    Assigned: September 9th, 2025
    Teacher Pacing Due Date: September 9th, 2025

    APCK Cyber: AP Cybersecurity – Topic 1.1 – Analyzing Cyber Attacks

    Objectives:

    • Students will be able to analyze a cyber attack, including identifying the phases of the attack, internalizing key learnings for future protection, and sharing an analysis of the attack with a non-technical audience.

    Standards:

    • 1.1.A Describe types of adversaries and their motivations.
    • 1.1.B Determine the type of attack used by a cyber adversary.
    • 1.1.C Determine the phases used in a cyber attack.

    Guiding Question:

    What are the common elements of a Cyber Attack?

    Resources:

    • 1.1 Analyzing Cyber Attacks PPT.pptx Presentation available on Google Classroom

    Assignment:

    1. Read through the 1.1 Analyzing Cyber Attacks PPT.pptx presentation in today’s class.
    2. Divide into groups of 2 – 3, your group will receive a specific historical cyber attack to research.
    3. Work as a team to complete the Cyber Attacks Case Study Analysis document available in the Google Classroom to research your assigned attack.
    4. You will be using the information your group collects on this graphic organizer to write a brief synopsis of your assigned attack including:
      • Who the adversaries carrying out the attack were,
      • How the attack happened
      • What the impact of the attack was
      • Who was impacted
    5. You will be sharing your information with the class on Monday via a 3–5-minute presentation.
    6. Many other information sources for these attacks are available beyond the provided articles. You are encouraged to use any and all resources available to you to go beyond the provided resources.
    7. Presentations will take place during Monday’s class meeting, and each team member will be expected to contribute, so prepare your materials accordingly.

    Article Links:

    Assigned: September 4th, 2025
    Teacher Pacing Due Date: September 8th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 5.4.1 – Security Compliance

    Objective:

    • Students will investigate the elements of effective security compliance..

    Standards:

    CompTIA Security+ SYO-701 Objective:
    5.4 – Summarize elements of effective security compliance

    Guiding Question:

    What are the elements of effective security compliance?

    Resources:

    • Lesson 5.4.1 – Security Compliance.pptx Presentation available on Google Classroom

    Assignment:

    1. Read through the Lesson 5.4.1 – Security Compliance.pptx presentation in today’s class.
    2. Complete the in-class Activity in class using the materials provided.

    Assigned: September 2nd, 2025
    Teacher Pacing Due Date: September 3rd, 2025

    CYBER.ORG: AP Cybersecurity – Topic 5.2.1 – Risk Management

    Objective:

    • Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.

    Standards:

    CompTIA Security+ SYO-701 Objective:
    5.2 – Explain elements of the risk management process

    Guiding Question:

    What are the factors used when calculating risk and how do you assign a value to risk?

    Resources:

    Assignment:

    1. Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
    2. Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.

    Assigned: August 29th, 2025
    Teacher Pacing Due Date: August 29th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 2.2.2 – OSINT

    Objective:

    • Students will investigate open source-online tools (OSINT) used to perform reconnaissance.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 6-8.DC.FOOT.1 -Recognize the many sources of data that make up a digital footprint
    • CSTA Compatibility Standards
      • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

    Guiding Question:

    How and why is open-source intelligence used legally to gather free, public information?

    Resources:

    Assignment:

    1. Follow along with the 2.2.2 – OSINT.pptx presentation in today’s class.
    2. Complete the OSINT Report on Tony Stark Activity in class using the materials provided in Google Classroom.

    Assigned: August 28th, 2025
    Teacher Pacing Due Date: August 29th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 2.1.1 – Social Engineering

    Objective:

    • Define the steps used in typical digital attacks.
    • Define social engineering as the human risk in organization security.
    • Identify techniques for social engineering and how to mitigate against these techniques.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
    • CSTA Compatibility Standards
      • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

    Guiding Question:

    How can we protect against social engineering?

    Resources:

    Assignment:

    1. Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
    2. Complete the Seven Steps of Hacking Activity in class using the materials provided.

    Assigned: August 27th, 2025
    Teacher Pacing Due Date: August 27th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 1.1.A – Threat Actors & Case Study – Stuxnet

    Objective:

    The student will analyze threat actors and their motivations.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 2.1 – Compare and contrast common threat actors and motivations

    Guiding Question:

    What are threat actors and their motivations?

    Resources:

    Assignment:

    1. Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
    2. Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
    3. Please do your best to complete the Case Study by end of day on Tuesday, August 26th.

    Assigned: August 25th, 2025
    Teacher Pacing Due Date: August 26th, 2025

    CYBER.ORG: AP Cybersecurity – Topic 1.1: Understanding Adversaries – Intro to Social Engineering

    Objective:

    • Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
    • Define social engineering and describe how attackers use it to exploit human behavior.
    • Explain what phishing is and how it could be used in a gaming scenario.

    Standards:

    • CYBER.ORG Cybersecurity Learning Standards
      • 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
      • 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.

    Guiding Question:

    How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?

    Resources:

    Assignment:

    1. Follow along with the Lesson 1.1.B presentation in today’s class.
    2. Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
    3. Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.

    Assigned: August 18th, 2025
    Teacher Pacing Due Date: August 21st, 2025

    AP CYBERSECURITY PRE-TEST – FALL 2025

    Objective: Demonstrate prior knowledge in Cybersecurity Principles through completion of a pre-test assessment.

    Resources:

    Assignment:

    Assigned: August 15th, 2025
    Teacher Pacing Due Date: August 15th, 2025