Objective:
Students will investigate mobile solutions.
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Mobile solutions
Mobile device management (MDM)
Deployment models
Bring your own device (BYOD)
Corporate-owned, personally enabled (COPE)
Choose your own device (CYOD)
Connection methods
Guiding Question:
What are common mobile solutions?
Resources:
Assignment:
Read the Lesson 4.1.3 – Mobile Solutions .pptx presentation in today’s class.
Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 8th, 2025 Teacher Pacing Due Date: December 9th, 2025
Objective:
Students will analyze potential supply chain issues and how to mitigate them.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Supply chain
Service provider
Hardware provider
Software provider
Cryptographic
Misconfiguration
Mobile device
Side loading
Jailbreaking
Zero-day
Guiding Question:
What are common supply chain issues and how can they be mitigated?
Resources:
Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 5th, 2025 Teacher Pacing Due Date: December 8th, 2025
Objective:
Students will analyze potential indicators associated with hardware and virtualization vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Hardware
Firmware
End-of-life
Legacy
Virtualization
Virtual machine (VM) escape
Resource reuse
Cloud-specific
Guiding Question:
What are hardware and virtualization vulnerabilities and how can they be mitigated?
Resources:
Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – VENOM Vulnerability.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 4th, 2025 Teacher Pacing Due Date: December 5th, 2025
Objective:
Students will analyze potential indicators associated with application attacks.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Application
Memory injection
Buffer overflow
Race conditions
Time-of-check (TOC)
Time-of-use (TOU)
Malicious Update
Guiding Question:
What are 3 application attacks that can occur by taking advantage of system memory?
Resources:
Lesson 2.3.1 – Application Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.1 – Application Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – iPhone Integer Overflow.pdf Activity in class using the materials provided in Google Classroom .
Assigned: November 18th, 2025 Teacher Pacing Due Date: November 19th, 2025
Objective:
Students will investigate methods of securing wireless devices.
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Wireless devices
Installation considerations
Wireless security settings
Wi-Fi Protected Access 3 (WPA3)
AAA/Remote Authentication Dial-In User Service (RADIUS)
Cryptographic protocols
Authentication protocols
Guiding Question:
What are common methods to secure wireless devices?
Resources:
Assignment:
Read the Lesson 4.1.2 – Wireless Devices .pptx presentation in today’s class.
Complete the Case Study – Wireless Jamming.pdf Activity in class using the materials provided in Google Classroom .
Assigned: November 17th, 2025 Teacher Pacing Due Date: November 18th, 2025
Objective:
Students will analyze potential indicators associated with network attacks.
Standards:
CompTIA Security+ SYO-701 Objective: 2.4 – Given a scenario, analyze indicators of malicious activity
Network Attacks
Distributed denial-of-service (DDoS)
Guiding Question:
What are 3 types of DDoS attacks and how can you defend against them?
Resources:
Assignment:
Read the 2.4.8 – DoS and DDoS.pptx presentation in today’s class.
Complete the Case Study – Botnet Activity in class using the materials provided in Google Classroom .
We will conduct a DoS Lab Activity when we return from the Veterans Day recess on Wednesday!
Assigned: November 10th, 2025 Teacher Pacing Due Date: November 12th, 2025
Objective:
Students will analyze common methods to identify vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective: 4.3 – Explain various activities associated with vulnerability management
Identification methods
Vulnerability scan
Application security
Static analysis
Dynamic analysis
Package monitoring
Threat feed
Open-source intelligence (OSINT)
Proprietary/third-party
Information-sharing organization
Dark web
Penetration testing
Responsible disclosure program
System/process audit
Guiding Question:
What are some common methods to identify vulnerabilities?
Resources:
4.3.1 – Identifying Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the 4.3.1 – Identifying Vulnerabilities.pptx presentation in today’s class.
Complete the Case Study – Pen Testing Activity in class using the materials provided in Google Classroom .
Assigned: October 20th, 2025 Teacher Pacing Due Date: October 21st, 2025
Objective:
Students will be able to explain how organizations can be more cyber resilient.
Standards:
CompTIA Security+ SYO-701 Objective: 4.5 – Given a scenario, modify enterprise capabilities to enhance security
Implementation of secure protocols
Protocol selection
Port selection
Transport method
DNS filtering
Email security
Domain-based Message Authentication Reporting and Conformance (DMARC)
DomainKeys Identified Mail (DKIM)
Sender Policy Framework (SPF)
Gateway
Guiding Question:
What are some common methods to enhance security for enterprise networks and communications?
Resources:
Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx Presentation and Case Study – Heartbleed.pdf available on Google Classroom
Assignment:
Read through the Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx presentation in today’s class.
Complete the Case Study – Heartbleed.pdf using the materials provided.
Assigned: September 29th, 2025 Teacher Pacing Due Date: September 30th, 2025
Objective:
Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.
Standards:
CompTIA Security+ SYO-701 Objective: 5.2 – Explain elements of the risk management process
Guiding Question:
What are the factors used when calculating risk and how do you assign a value to risk?
Resources:
Assignment:
Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom .
Assigned: August 29th, 2025 Teacher Pacing Due Date: August 29th, 2025
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentation: 1.2.6 – Bots and Botnets.pptx
See PDF Document: Case Study – Botnet
Assignment:
Begin reading the 1.2.6 – Bots and Botnets .pptx presentation.
Read the Case Study – Botnet.pdf document and be prepared to answer the questions at the end.
Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Tuesday.
Assigned: April 24th, 2023 Teacher Pacing Due Date: April 25th, 2023
Posts navigation
It's dangerous to go alone!