Objective:
- Students will be able to analyze common architecture and infrastructure concepts.
Standards:
CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing
- Secure baselines
- Establish
- Deploy
- Maintain
- Hardening targets
- Mobile devices
- Workstations
- Switches
- Routers
- Cloud infrastructure
- Servers
- ICS/SCADA
- Embedded Systems
- RTOS
- IoT devices
Guiding Question:
What are common methods to secure baselines and harden targets?
Resources:
- 4.1.1 – Hardening Targets and Secure Baselines.pptx Presentation available on Google Classroom
Assignment:
- Read the 4.1.1 – Hardening Targets and Secure Baselines.pptx presentation in today’s class.
- Complete the Unit 3 – Hardening Targets and Secure Baselines Check for Understanding activity using the materials provided in Google Classroom.
Assigned: January 7th, 2026
Teacher Pacing Due Date: January 8th, 2026
Objective:
- Students will be able to analyze common architecture and infrastructure concepts.
Standards:
CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models
- Architecture and infrastructure concepts
- Cloud
- Responsibility matrix
- Hybrid considerations
- Third-party vendors
- Infrastructure as code (IaC)
- Serverless
- Microservices
- Network infrastructure
- Physical isolation
- Logical segmentation
- Software-defined networking (SDN)
- On-premises
- Centralized vs. decentralized
- Containerization
- Virtualization
- IoT
- Industrial control systems (ICS)/supervisory control and data acquisition (SCADA)
- Real-time operating system (RTOS)
- Embedded systems
- High availability
Guiding Question:
What are common architecture and infrastructure concepts?
Resources:
- 3.1.1 – Architecture and Infrastructure Concepts.pptx Presentation available on Google Classroom
Assignment:
- Read the 3.1.1 – Architecture and Infrastructure Concepts.pptx presentation in today’s class.
- Complete the Unit 3 – Architecture and Infrastructure Concepts Check for Understanding activity using the materials provided in Google Classroom.
- Next, complete the Case Study – Specialized Systems Vulnerabilities Activity using the document and Form posted in the Google Classroom.
- Please do your best to complete the Case Study by end of day on Wednesday, January 7th.
Assigned: January 6th, 2026
Teacher Pacing Due Date: January 7th, 2026
Objective:
- Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.
Standards:
CompTIA Security+ SYO-701 Objective:
2.5 – Explain the purpose of mitigation techniques used to secure the enterprise
- Segmentation
- Access control
- Access control list (ACL)
- Permissions
- Application allow list
- Isolation
- Patching
- Encryption
- Monitoring
- Least privilege
- Configuration enforcement
- Decommissioning
Guiding Question:
What are common mitigation techniques that can be used to secure the enterprise?
Resources:
- Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.5.1 – Mitigation Techniques.pptx presentation in today’s class.
- Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom.
Assigned: January 5th, 2025
Teacher Pacing Due Date: January 6th, 2025
Objective: Demonstrate current levels knowledge in Cybersecurity Principles through completion of an assessment.
Resources:
Assignment:
Assigned: December 15th, 2025
Teacher Pacing Due Date: December 15th, 2025
Objective:
- Students will be able to implement secure network designs.
Standards:
CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
- Infrastructure considerations
- Network Appliances
- Jump Server
- Proxy Server
- Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
- Load balancer
- Sensors
Guiding Question:
How are network appliances secured?
Resources:
- Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 3.2.2 – Network Appliances.pptx presentation in today’s class.
- Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom.
Assigned: December 12th, 2025
Teacher Pacing Due Date: December 15th, 2025
Objective:
- Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.
Standards:
CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security
- Firewalls
- Rules
- Access lists
- Ports/protocols
- Screened subnets
- IDS/IPS
- Web filter
- Agent-based
- Centralized proxy
- Universal Resource Locator (URL) scanning
- Content categorization
- Block rules
- Reputation
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
- Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx presentation in today’s class.
- Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom.
Assigned: December 11th, 2025
Teacher Pacing Due Date: December 12th, 2025
Objective:
- Students will compare various types of infrastructure security systems.
Standards:
CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
- Infrastructure considerations
- Device placement
- Security zones
- Attack surface
- Connectivity
- Failure modes
- Device attribute
- Active vs passive
- Inline vs tap/monitor
- Port security
- 802.1X
- Extensible Authentication Protocol (EAP)
- Firewall types
- Web application firewall (WAF)
- Unified threat management (UTM)
- Next-generation firewall (NGFW)
- Layer 4/Layer 7
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
- Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 3.2.1 – Infrastructure Considerations.pptx presentation in today’s class.
- Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom.
Assigned: December 10th, 2025
Teacher Pacing Due Date: December 11th, 2025
Objective:
- Students will analyze common architecture considerations.
Standards:
CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models
- Considerations
- Availability
- Resilience
- Cost
- Responsiveness
- Scalability
- Risk transference
- Ease of recovery
- Patch availability
- Inability to patch
- Power
- Compute
Guiding Question:
What are common architecture considerations?
Resources:
- Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 3.1.2 – Architecture Considerations.pptx presentation in today’s class.
- Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom.
Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025
Objective:
- Students will investigate mobile solutions.
Standards:
CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing
- Mobile solutions
- Mobile device management (MDM)
- Deployment models
- Bring your own device (BYOD)
- Corporate-owned, personally enabled (COPE)
- Choose your own device (CYOD)
- Connection methods
Guiding Question:
What are common mobile solutions?
Resources:
Assignment:
- Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
- Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025
Objective:
- Students will analyze potential supply chain issues and how to mitigate them.
Standards:
CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities
- Supply chain
- Service provider
- Hardware provider
- Software provider
- Cryptographic
- Misconfiguration
- Mobile device
- Side loading
- Jailbreaking
- Zero-day
Guiding Question:
What are common supply chain issues and how can they be mitigated?
Resources:
- Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
- Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025
It's dangerous to go alone!