Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.
Standards:
CompTIA Security+ SYO-701 Objective: 5.2 – Explain elements of the risk management process
Guiding Question:
What are the factors used when calculating risk and how do you assign a value to risk?
Resources:
5.2.1 – Risk Management.pptx Presentation available on Google Classroom
Assignment:
Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.
Assigned: August 29th, 2025 Teacher Pacing Due Date: August 29th, 2025
The student will summarize the techniques used in security assessments.
Resources:
See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf
Assignment:
Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 7th, 2023 Teacher Pacing Due Date: March 8th, 2023
Compare and contrast different types of social engineering techniques.
Resources:
See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf
Assignment:
Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.
Assigned: December 7th, 2021 Teacher Pacing Due Date: December 9th, 2021