Tag Archives: AP Cybersecurity

CYBER.ORG: AP Cybersecurity – 4.1.1 – Hardening Targets and Secure Baselines

Objective:

  • Students will be able to analyze common architecture and infrastructure concepts.

Standards:

CompTIA Security+ SYO-701 Objective:

4.1 – Given a scenario, apply common security techniques to computing

  • Secure baselines
    • Establish
    • Deploy
    • Maintain
  • Hardening targets
    • Mobile devices
    • Workstations
    • Switches
    • Routers
    • Cloud infrastructure
    • Servers
    • ICS/SCADA
    • Embedded Systems
    • RTOS
    • IoT devices

Guiding Question:

What are common methods to secure baselines and harden targets?

Resources:

  • 4.1.1 – Hardening Targets and Secure Baselines.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 4.1.1 – Hardening Targets and Secure Baselines.pptx presentation in today’s class.
  2. Complete the Unit 3 – Hardening Targets and Secure Baselines Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 7th, 2026
Teacher Pacing Due Date: January 8th, 2026

CYBER.ORG: AP Cybersecurity – 3.1.1 – Architecture and Infrastructure Concepts & Case Study – Specialized Systems Vulnerabilities

Objective:

  • Students will be able to analyze common architecture and infrastructure concepts.

Standards:

CompTIA Security+ SYO-701 Objective:

3.1 – Compare and contrast security implications of different architecture models

  • Architecture and infrastructure concepts
    • Cloud
      • Responsibility matrix
      • Hybrid considerations
      • Third-party vendors
    • Infrastructure as code (IaC)
    • Serverless
    • Microservices
    • Network infrastructure
      • Physical isolation
        • Air-gapped
      • Logical segmentation
        • Software-defined networking (SDN)
    • On-premises
    • Centralized vs. decentralized
    • Containerization
    • Virtualization
    • IoT
    • Industrial control systems (ICS)/supervisory control and data acquisition (SCADA)
    • Real-time operating system (RTOS)
    • Embedded systems
    • High availability

Guiding Question:

What are common architecture and infrastructure concepts?

Resources:

  • 3.1.1 – Architecture and Infrastructure Concepts.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 3.1.1 – Architecture and Infrastructure Concepts.pptx presentation in today’s class.
  2. Complete the Unit 3 – Architecture and Infrastructure Concepts Check for Understanding activity using the materials provided in Google Classroom.
  3. Next, complete the Case Study – Specialized Systems Vulnerabilities Activity using the document and Form posted in the Google Classroom.
  4. Please do your best to complete the Case Study by end of day on Wednesday, January 7th.

Assigned: January 6th, 2026
Teacher Pacing Due Date: January 7th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Mitigation Techniques

Objective:

  • Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.

Standards:

CompTIA Security+ SYO-701 Objective:

2.5 – Explain the purpose of mitigation techniques used to secure the enterprise

  • Segmentation
  • Access control
    • Access control list (ACL)
    • Permissions
  • Application allow list
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least privilege
  • Configuration enforcement
  • Decommissioning

Guiding Question:

What are common mitigation techniques that can be used to secure the enterprise?

Resources:

  • Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Mitigation Techniques.pptx presentation in today’s class.
  2. Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom.

Assigned: January 5th, 2025
Teacher Pacing Due Date: January 6th, 2025

AP CYBERSECURITY CHECKPOINT QUIZ – FALL 2025

Objective: Demonstrate current levels knowledge in Cybersecurity Principles through completion of an assessment.

Resources:

Assignment:

Assigned: December 15th, 2025
Teacher Pacing Due Date: December 15th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.2.2 – Network Appliances

Objective:

  • Students will be able to implement secure network designs.

Standards:

CompTIA Security+ SYO-701 Objective:

3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Network Appliances
      • Jump Server
      • Proxy Server
      • Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
      • Load balancer
      • Sensors

Guiding Question:

How are network appliances secured?

Resources:

  • Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.2 – Network Appliances.pptx presentation in today’s class.
  2. Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom.

Assigned: December 12th, 2025
Teacher Pacing Due Date: December 15th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter

Objective:

  • Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.

Standards:

CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Firewalls
    • Rules
    • Access lists
    • Ports/protocols
    • Screened subnets
  • IDS/IPS
    • Trends
    • Signatures
  • Web filter
    • Agent-based
    • Centralized proxy
    • Universal Resource Locator (URL) scanning
    • Content categorization
    • Block rules
    • Reputation

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx presentation in today’s class.
  2. Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom.

Assigned: December 11th, 2025
Teacher Pacing Due Date: December 12th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.2.1 – Infrastructure Considerations

Objective:

  • Students will compare various types of infrastructure security systems.

Standards:

CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Device placement
    • Security zones
    • Attack surface
    • Connectivity
    • Failure modes
      • Fail-open
      • Fail-closed
    • Device attribute
      • Active vs passive
      • Inline vs tap/monitor
    • Port security
      • 802.1X
      • Extensible Authentication Protocol (EAP)
    • Firewall types
      • Web application firewall (WAF)
      • Unified threat management (UTM)
      • Next-generation firewall (NGFW)
      • Layer 4/Layer 7

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.1 – Infrastructure Considerations.pptx presentation in today’s class.
  2. Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom.

Assigned: December 10th, 2025
Teacher Pacing Due Date: December 11th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.1.2 – Architecture Considerations

Objective:

  • Students will analyze common architecture considerations.

Standards:

CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models

  • Considerations
    • Availability
    • Resilience
    • Cost
    • Responsiveness
    • Scalability
    • Risk transference
    • Ease of recovery
    • Patch availability
    • Inability to patch
    • Power
    • Compute

Guiding Question:

What are common architecture considerations?

Resources:

  • Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.1.2 – Architecture Considerations.pptx presentation in today’s class.
  2. Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom.

Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.3 – Mobile Solutions

Objective:

  • Students will investigate mobile solutions.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Mobile solutions
    • Mobile device management (MDM)
    • Deployment models
      • Bring your own device (BYOD)
      • Corporate-owned, personally enabled (COPE)
      • Choose your own device (CYOD)
    • Connection methods
      • Cellular
      • Wi-Fi
      • Bluetooth

Guiding Question:

What are common mobile solutions?

Resources:

  • Lesson 4.1.3 – Mobile Solutions.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
  2. Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities

Objective:

  • Students will analyze potential supply chain issues and how to mitigate them.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Supply chain
    • Service provider
    • Hardware provider
    • Software provider
  • Cryptographic
  • Misconfiguration
  • Mobile device
    • Side loading
    • Jailbreaking
  • Zero-day

Guiding Question:

What are common supply chain issues and how can they be mitigated?

Resources:

  • Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025