Objective:
- Students will investigate common methods to manage access.
Standards:
CompTIA Security+ SYO-701 Objective:
4.6 – Given a scenario, implement and maintain identity and access management
- Provisioning/de-provisioning user accounts
- Permission assignments and implications
- Identity proofing
- Federation
- Single sign-on (SSO)
- Lightweight Directory Access Protocol (LDAP)
- Open authorization (OAuth)
- Security Assertions Markup Language (SAML)
- Interoperability
- Attestation
- Access controls
- Mandatory
- Discretionary
- Role-based
- Rule-based
- Attribute-based
- Time-of-day restrictions
- Least privilege
- Privileged access management tools
- Just-in-time permissions
- Password vaulting
- Ephemeral credentials
Guiding Question:
What are some common methods to manage access?
Resources:
Assignment:
- Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
- Complete the Unit 3 – Access Management Check for Understanding activity using the materials provided in Google Classroom.
- Complete the Case Study – Quantum Cryptography.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025
Objective:
- Students will be able to analyze common architecture and infrastructure concepts.
Standards:
CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models
- Architecture and infrastructure concepts
- Cloud
- Responsibility matrix
- Hybrid considerations
- Third-party vendors
- Infrastructure as code (IaC)
- Serverless
- Microservices
- Network infrastructure
- Physical isolation
- Logical segmentation
- Software-defined networking (SDN)
- On-premises
- Centralized vs. decentralized
- Containerization
- Virtualization
- IoT
- Industrial control systems (ICS)/supervisory control and data acquisition (SCADA)
- Real-time operating system (RTOS)
- Embedded systems
- High availability
Guiding Question:
What are common architecture and infrastructure concepts?
Resources:
- 3.1.1 – Architecture and Infrastructure Concepts.pptx Presentation available on Google Classroom
Assignment:
- Read the 3.1.1 – Architecture and Infrastructure Concepts.pptx presentation in today’s class.
- Complete the Unit 3 – Architecture and Infrastructure Concepts Check for Understanding activity using the materials provided in Google Classroom.
- Next, complete the Case Study – Specialized Systems Vulnerabilities Activity using the document and Form posted in the Google Classroom.
- Please do your best to complete the Case Study by end of day on Wednesday, January 7th.
Assigned: January 6th, 2026
Teacher Pacing Due Date: January 7th, 2026
Objective:
- Students will investigate mobile solutions.
Standards:
CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing
- Mobile solutions
- Mobile device management (MDM)
- Deployment models
- Bring your own device (BYOD)
- Corporate-owned, personally enabled (COPE)
- Choose your own device (CYOD)
- Connection methods
Guiding Question:
What are common mobile solutions?
Resources:
Assignment:
- Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
- Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025
Objective:
- Students will analyze potential supply chain issues and how to mitigate them.
Standards:
CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities
- Supply chain
- Service provider
- Hardware provider
- Software provider
- Cryptographic
- Misconfiguration
- Mobile device
- Side loading
- Jailbreaking
- Zero-day
Guiding Question:
What are common supply chain issues and how can they be mitigated?
Resources:
- Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
- Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025
Objective:
- Students will analyze potential indicators associated with hardware and virtualization vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities
- Hardware
- Firmware
- End-of-life
- Legacy
- Virtualization
- Virtual machine (VM) escape
- Resource reuse
- Cloud-specific
Guiding Question:
What are hardware and virtualization vulnerabilities and how can they be mitigated?
Resources:
- Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx presentation in today’s class.
- Complete the Case Study – VENOM Vulnerability.pdf Activity in class using the materials provided in Google Classroom.
Assigned: December 4th, 2025
Teacher Pacing Due Date: December 5th, 2025
Objective:
- Students will analyze potential indicators associated with application attacks.
Standards:
CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities
- Application
- Memory injection
- Buffer overflow
- Race conditions
- Time-of-check (TOC)
- Time-of-use (TOU)
- Malicious Update
Guiding Question:
What are 3 application attacks that can occur by taking advantage of system memory?
Resources:
- Lesson 2.3.1 – Application Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.3.1 – Application Vulnerabilities.pptx presentation in today’s class.
- Complete the Case Study – iPhone Integer Overflow.pdf Activity in class using the materials provided in Google Classroom.
Assigned: November 18th, 2025
Teacher Pacing Due Date: November 19th, 2025
Objective:
- Students will investigate methods of securing wireless devices.
Standards:
CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing
- Wireless devices
- Installation considerations
- Wireless security settings
- Wi-Fi Protected Access 3 (WPA3)
- AAA/Remote Authentication Dial-In User Service (RADIUS)
- Cryptographic protocols
- Authentication protocols
Guiding Question:
What are common methods to secure wireless devices?
Resources:
Assignment:
- Read the Lesson 4.1.2 – Wireless Devices.pptx presentation in today’s class.
- Complete the Case Study – Wireless Jamming.pdf Activity in class using the materials provided in Google Classroom.
Assigned: November 17th, 2025
Teacher Pacing Due Date: November 18th, 2025
Objective:
- Students will analyze potential indicators associated with network attacks.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
- Network Attacks
- Distributed denial-of-service (DDoS)
Guiding Question:
What are 3 types of DDoS attacks and how can you defend against them?
Resources:
Assignment:
- Read the 2.4.8 – DoS and DDoS.pptx presentation in today’s class.
- Complete the Case Study – Botnet Activity in class using the materials provided in Google Classroom.
- We will conduct a DoS Lab Activity when we return from the Veterans Day recess on Wednesday!
Assigned: November 10th, 2025
Teacher Pacing Due Date: November 12th, 2025
Objective:
- Students will analyze common methods to identify vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management
- Identification methods
- Vulnerability scan
- Application security
- Static analysis
- Dynamic analysis
- Package monitoring
- Threat feed
- Open-source intelligence (OSINT)
- Proprietary/third-party
- Information-sharing organization
- Dark web
- Penetration testing
- Responsible disclosure program
- System/process audit
Guiding Question:
What are some common methods to identify vulnerabilities?
Resources:
- 4.3.1 – Identifying Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
- Read the 4.3.1 – Identifying Vulnerabilities.pptx presentation in today’s class.
- Complete the Case Study – Pen Testing Activity in class using the materials provided in Google Classroom.
Assigned: October 20th, 2025
Teacher Pacing Due Date: October 21st, 2025
Objective:
- Students will be able to explain how organizations can be more cyber resilient.
Standards:
CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security
- Implementation of secure protocols
- Protocol selection
- Port selection
- Transport method
- DNS filtering
- Email security
- Domain-based Message Authentication Reporting and Conformance (DMARC)
- DomainKeys Identified Mail (DKIM)
- Sender Policy Framework (SPF)
- Gateway
Guiding Question:
What are some common methods to enhance security for enterprise networks and communications?
Resources:
- Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx Presentation and Case Study – Heartbleed.pdf available on Google Classroom
Assignment:
- Read through the Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx presentation in today’s class.
- Complete the Case Study – Heartbleed.pdf using the materials provided.
Assigned: September 29th, 2025
Teacher Pacing Due Date: September 30th, 2025
It's dangerous to go alone!