Tag Archives: AP Cybersecurity

CYBER.ORG: AP Cybersecurity – Lesson 4.2.1 – Cryptography Basic Concepts

Objective:

  • Students will:
    • Examine cryptography vocabulary terms and methods of encryption.
    • Identify cryptographic algorithms and define how they can be used to help improve security.

Standards:

CompTIA Security+ SYO-701 Objective:

1.4 – Explain the importance of using appropriate cryptographic solutions

    Guiding Question:

    How have various cryptography methods been used from ancient history to modern day to protect vital information?

    Resources:

    • Lesson 4.2.1 – Cryptography Concepts.pptx presentation and Activity 4.2.1 – Breaking Ciphers form available on Google Classroom

    Assignment:

    1. Read the Lesson 4.2.1 – Cryptography Concepts.pptx presentation in today’s class.
    2. Complete the Activity 4.2.1 – Breaking Ciphers Activity using the form posted in the Google Classroom. Solve the Ciphers and hand in the completed form to complete the Lab Activity (50 pts).

    Assigned: April 10th, 2026
    Teacher Pacing Due Date: April 13th, 2026

    APCK Cyber: AP Cybersecurity – Topic 5.4 – Assymetric Cryptography: Secrets

    Objectives:

    • Students will be able to apply asymmetric encryption algorithms to encrypt and decrypt data.

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions.

    • Encryption
    • Asymmetric
    • Symmetric
    • Key exchange
    • Algorithms

    Guiding Question:

    How does Assymetric Cryptography power modern communications?

    Resources:

    • 5.4 Asymmetric Cryptography.pptx and 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide available on Google Classroom

    Assignment:

    1. Read through the 5.4 Asymmetric Cryptography.pptx presentation in today’s class. We will use the information in the presentation along with what we learned yesterday about Asymmetric Cryptography to complete an in-class Lab Activity.
    2. Follow the instructions provided in the 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide in today’s Google Classroom Assignment Post to complete the lab activity.

    Assigned: April 9th, 2026
    Teacher Pacing Due Date: April 10th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 10.1.2 – Asymmetric Encryption

    Objective:

    • Identify the strengths of using asymmetric encryption
    • Explain the steps involved with asymmetric encryption

    Standards:


    CompTIA Security+ Objective(s)

    1.4 Explain the importance of using appropriate cryptographic solutions.

    • Public key infrastructure (PKI)
      • Public key
      • Private key
      • Key escrow
    • Encryption
      • Asymmetric
      • Key exchange
      • Algorithms
      • Key length

    Guiding Question:

    How does asymmetric encryption allow the protection of sensitive information without the difficulty of sharing secret keys?

    Resources:

    • Lesson 10.1.2 – Asymmetric Encryption.pptx presentation and Activity 10.1.2- Investigating RSA keypairs form available on Google Classroom

    Assignment:

    1. Read the Lesson 10.1.2 – Asymmetric Encryption.pptx presentation in today’s class.
    2. Choose a partner and complete Part A of the Activity 10.1.2- Investigating RSA keypairs Google Form provided in the Google Classroom. Answer the three Part A: Closing questions for discussion in your form.
    3. Proceed to Part B, and paste a screenshot of the decrypted message received from your partner in Cyberchef into the Form to complete the lab. (50 pts)

    Assigned: April 8th, 2026
    Teacher Pacing Due Date: April 9th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 10.1.1 – Symmetric Encryption

    Objective:

    • Identify the importance of using encryption policies when sending information
    • Explain the steps involved with symmetric encryption

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions

    • Encryption
      • Symmetric
      • Key exchange
      • Algorithms
      • Key length
    • Tools
      • Trusted Platform Module (TPM)

    Guiding Question:

    How does encryption protect against a loss of confidentiality of sensitive information and what steps are involved in symmetric encryption?

    Resources:

    • Lesson 10.1.1 – Symmetric Encryption.pptx presentation and Activity 10.1.1 – Creating a Key Exchange Method form available on Google Classroom

    Assignment:

    1. Read the Lesson 10.1.1 – Symmetric Encryption.pptx presentation in today’s class.
    2. Choose a partner and complete Part 1 of the Activity 10.1.1 – Creating a Key Exchange Method Google Form provided in the Google Classroom.
    3. We will go around the room describing the “Key Exchange” solutions devised by our groups and assess their strengths and weaknesses. Use the in-class discussion to complete Part 2 of the Activity and hand in the completed Activity form for credit (50 points)

    Assigned: April 6th, 2026
    Teacher Pacing Due Date: April 7th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.4.2 – Encryption

    Objective:

    • Students will summarize the basics of encryption.

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions

    • Encryption
      • Level
        • Full-disk
        • Partition
        • File
        • Volume
        • Database
        • Record
      • Transport/communication
      • Asymmetric
      • Symmetric
      • Key exchange
      • Algorithms
      • Key length

    Guiding Question:

    What are the different types of encryption?

    Resources:

    • Lesson 1.4.2 – Encryption.pptx and Lab 1.4.2 – Linux Personal File Encryption.pptx presentations available on Google Classroom

    Assignment:

    1. Read the Lesson 1.4.2 – Encryption.pptx presentation in today’s class.
    2. Complete the Lab 1.4.2 – Linux Personal File Encryption Activity using the Lab 1.4.2 – Linux Personal File Encryption.pptx Powerpoint Presentation posted in the Google Classroom.
    3. To confirm completion of today’s Lab activity, post screenshots of the results of the Your Turn slide 13 (where you will share a simple .zip encrypted message with your partner) and slide 20 (where you will share an encrypted message with a shared key with your partner) to today’s Google Classroom assignment. Make sure your screenshots demonstrate the message received from your partner and the software you used to open the encrypted message.

    Assigned: April 1st, 2026
    Teacher Pacing Due Date: April 2nd, 2026

    APCK Cyber: AP Cybersecurity – Topic 5.2 Setting Access Controls

    Objectives:

    • Students will be able to configure access control settings on a Linux-based system.

    Standards:

    CompTIA SY0-701 Objectives:

    • 4.6.1 – Provisioning/de-provisioning user accounts

    Guiding Question:

    Why are access controls important, and why do we need them?

    Resources:

    • 5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom

    Assignment:

    1. Read through the 5.2 Setting Access Controls.pptx presentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
    2. Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.

    Assigned: March 26th, 2026
    Teacher Pacing Due Date: March 27th, 2026

    CYBER.ORG: AP Cybersecurity – 6.4.1 – SQL and Databases

    Objective:

    • Students will:
      • Understand what SQL (Structured Query Language) is and its role in database management.
      • Learn how SQL can be used maliciously in attacks, such as SQL injections.
      • Explore how SQL can be used defensively to protect and monitor data.investigate common methods to manage access..

    Standards:

    CompTIA Security+ SYO-701 Objective:

    2.3 Explain various types of vulnerabilities.

    • Web Based

      Guiding Question:

      What is SQL and its primary use in cybersecurity in relation to databases?

      Resources:

      • Lesson 6.4.1 – SQL and Databases.pptx and Lab 6.4.1 – SQL Queries.pptx Presentations and Lab 6.4.1 – SQL Queries activity sheet available on Google Classroom

      Assignment:

      1. Read the Lesson 6.4.1 – SQL and Databases.pptx presentation in today’s class.
      2. Complete the Lab 6.4.1 – SQL Queries Activity using the Lab 6.4.1 – SQL Queries.pptx Powerpoint Presentation and Form posted in the Google Classroom.

      Assigned: March 23rd, 2026
      Teacher Pacing Due Date: March 25th, 2026

      CYBER.ORG: AP Cybersecurity – Lesson 1.3.1 – Types of Data and Regulations Involved

      Objective:

      Students will be able to:

      • Identify different types of data and their security needs.
      • Understand the different data classifications.
      • Explain the significance of regulatory compliance.
      • Describe key data protection laws and best practices.
      • Explain methods for securing data.

      Standards:

      CompTIA Security+ Objective(s)

      • 3.3 Compare and contrast concepts and strategies to protect data.

      Guiding Question:

      What are the different types of data and why is their classification important?

      Resources:

      • Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom

      Assignment:

      1. Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx  Microsoft PowerPoint slideshow in today’s class.
      2. Complete the CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity provided in Google Classroom. (25 pts)

      Assigned: March 16th, 2026
      Teacher Pacing Due Date: March 17th, 2026

      APCK Cyber: AP Cybersecurity – Topic 4.3 Let’s Make Secure Passwords!

      Objectives:

      • Students will be able to configure login settings for users to require industry standard security practices.

      Standards:

      • 4.3.A Describe managerial controls related to device security.
      • 4.3.D Configure login settings to make a device more secure.

      Guiding Question:

      How do we create strong passwords, and why do we need them?

      Resources:

      • 4.3 Let’s Make Secure Passwords!.pptx, 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide and 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide available on Google Classroom

      Assignment:

      1. Read through the 4.3 Let’s Make Secure Passwords!.pptx presentation in today’s class.
      2. Divide into groups of 2. You are going to try to crack various “employee passwords” based on information the employees have shared online in class today.
      3. Use the instructions and take notes in the 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide and answer the questions in the 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide. Work as a team to complete the lab by creating and cracking various types of passwords.

      Assigned: March 5th, 2026
      Teacher Pacing Due Date: March 6th, 2026

      CYBER.ORG: AP Cybersecurity – Lesson 1.1.5 – Methods of Authentication

      Objective:

      Students will be able to:

      • Define alternatives to passwords for authentication.
      • Demonstrate an understanding of various methods of authentication
      • Make a convincing argument as to what methods of authentication would best accomplish their assigned goal.

      Standards:

      CSTA Compatibility Standards

      • 3A-NI-06: Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
      • 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
      • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

      Guiding Question:

      What are various methods of authentication?

      Resources:

      • Lesson Slides 1.1.5 – Methods of Authentication.pptx Presentation, Activity 1.1.5 – Which Authentication Activity available on Google Classroom

      Assignment:

      1. Read the 1.1.5 – Methods of Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
      2. Complete the Activity 1.1.5 – Which Authentication Activity provided in Google Classroom. (50 pts)

      Assigned: March 4th, 2026
      Teacher Pacing Due Date: March 5th, 2026