Tag Archives: Case Study

CYBER.ORG: AP Cybersecurity – Lesson 4.1.3 – Mobile Solutions

Objective:

  • Students will investigate mobile solutions.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Mobile solutions
    • Mobile device management (MDM)
    • Deployment models
      • Bring your own device (BYOD)
      • Corporate-owned, personally enabled (COPE)
      • Choose your own device (CYOD)
    • Connection methods
      • Cellular
      • Wi-Fi
      • Bluetooth

Guiding Question:

What are common mobile solutions?

Resources:

  • Lesson 4.1.3 – Mobile Solutions.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
  2. Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities

Objective:

  • Students will analyze potential supply chain issues and how to mitigate them.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Supply chain
    • Service provider
    • Hardware provider
    • Software provider
  • Cryptographic
  • Misconfiguration
  • Mobile device
    • Side loading
    • Jailbreaking
  • Zero-day

Guiding Question:

What are common supply chain issues and how can they be mitigated?

Resources:

  • Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with hardware and virtualization vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Hardware
    • Firmware
    • End-of-life
    • Legacy
  • Virtualization
    • Virtual machine (VM) escape
    • Resource reuse
  • Cloud-specific

Guiding Question:

What are hardware and virtualization vulnerabilities and how can they be mitigated?

Resources:

  • Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.3 – Hardware and Virtualization Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – VENOM Vulnerability.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 4th, 2025
Teacher Pacing Due Date: December 5th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Application Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Application
    • Memory injection
    • Buffer overflow
    • Race conditions
      • Time-of-check (TOC)
      • Time-of-use (TOU)
    • Malicious Update

Guiding Question:

What are 3 application attacks that can occur by taking advantage of system memory?

Resources:

  • Lesson 2.3.1 – Application Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.1 – Application Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – iPhone Integer Overflow.pdf Activity in class using the materials provided in Google Classroom.

Assigned: November 18th, 2025
Teacher Pacing Due Date: November 19th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.2 – Wireless Devices

Objective:

  • Students will investigate methods of securing wireless devices.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Wireless devices
    • Installation considerations
      • Site surveys
      • Heat maps
  • Wireless security settings
    • Wi-Fi Protected Access 3 (WPA3)
    • AAA/Remote Authentication Dial-In User Service (RADIUS)
    • Cryptographic protocols
    • Authentication protocols

Guiding Question:

What are common methods to secure wireless devices?

Resources:

  • Lesson 4.1.2 – Wireless Devices.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.2 – Wireless Devices.pptx presentation in today’s class.
  2. Complete the Case Study – Wireless Jamming.pdf Activity in class using the materials provided in Google Classroom.

Assigned: November 17th, 2025
Teacher Pacing Due Date: November 18th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.8 – DoS and DDoS

Objective:

  • Students will analyze potential indicators associated with network attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Network Attacks
    • Distributed denial-of-service (DDoS)
      • Amplified
      • Reflected

Guiding Question:

What are 3 types of DDoS attacks and how can you defend against them?

Resources:

Assignment:

  1. Read the 2.4.8 – DoS and DDoS.pptx presentation in today’s class.
  2. Complete the Case Study – Botnet Activity in class using the materials provided in Google Classroom.
  3. We will conduct a DoS Lab Activity when we return from the Veterans Day recess on Wednesday!

Assigned: November 10th, 2025
Teacher Pacing Due Date: November 12th, 2025

CYBER.ORG: AP Cybersecurity – Topic 4.3.1 – Identifying Vulnerabilities

Objective:

  • Students will analyze common methods to identify vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management

  • Identification methods
    • Vulnerability scan
    • Application security
      • Static analysis
      • Dynamic analysis
      • Package monitoring
    • Threat feed
      • Open-source intelligence (OSINT)
      • Proprietary/third-party
      • Information-sharing organization
      • Dark web
    • Penetration testing
    • Responsible disclosure program
      • Bug bounty program
    • System/process audit

Guiding Question:

What are some common methods to identify vulnerabilities?

Resources:

  • 4.3.1 – Identifying Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 4.3.1 – Identifying Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Pen Testing Activity in class using the materials provided in Google Classroom.

Assigned: October 20th, 2025
Teacher Pacing Due Date: October 21st, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.5.1 – Endpoint – Protocol & Email Security

Objective:

  • Students will be able to explain how organizations can be more cyber resilient.

Standards:

CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Implementation of secure protocols
    • Protocol selection
    • Port selection
    • Transport method
  • DNS filtering
  • Email security
    • Domain-based Message Authentication Reporting and Conformance (DMARC)
    • DomainKeys Identified Mail (DKIM)
    • Sender Policy Framework (SPF)
    • Gateway

Guiding Question:

What are some common methods to enhance security for enterprise networks and communications?

Resources:

  • Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx Presentation and Case Study – Heartbleed.pdf available on Google Classroom

Assignment:

  1. Read through the Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx presentation in today’s class.
  2. Complete the Case Study – Heartbleed.pdf using the materials provided.

Assigned: September 29th, 2025
Teacher Pacing Due Date: September 30th, 2025

CYBER.ORG: AP Cybersecurity – Topic 5.2.1 – Risk Management

Objective:

  • Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.

Standards:

CompTIA Security+ SYO-701 Objective:
5.2 – Explain elements of the risk management process

Guiding Question:

What are the factors used when calculating risk and how do you assign a value to risk?

Resources:

Assignment:

  1. Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
  2. Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.

Assigned: August 29th, 2025
Teacher Pacing Due Date: August 29th, 2025

CYBER.ORG – 1.2.6 – Bots and Botnets & Case Study – Botnet

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentation: 1.2.6 – Bots and Botnets.pptx
  • See PDF Document: Case Study – Botnet

Assignment:

  1. Begin reading the 1.2.6 – Bots and Botnets.pptx presentation.
  2. Read the Case Study – Botnet.pdf document and be prepared to answer the questions at the end.
  3. Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Tuesday.

Assigned: April 24th, 2023
Teacher Pacing Due Date: April 25th, 2023