Objective:
Students will be able to explain how organizations can be more cyber resilient.
Standards:
CompTIA Security+ SYO-701 Objective: 4.5 – Given a scenario, modify enterprise capabilities to enhance security
Implementation of secure protocols
Protocol selection
Port selection
Transport method
DNS filtering
Email security
Domain-based Message Authentication Reporting and Conformance (DMARC)
DomainKeys Identified Mail (DKIM)
Sender Policy Framework (SPF)
Gateway
Guiding Question:
What are some common methods to enhance security for enterprise networks and communications?
Resources:
Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx Presentation and Case Study – Heartbleed.pdf available on Google Classroom
Assignment:
Read through the Lesson PPT Lesson 4.5.1 – Endpoint – Protocol & Email Security.pptx presentation in today’s class.
Complete the Case Study – Heartbleed.pdf using the materials provided.
Assigned: September 29th, 2025 Teacher Pacing Due Date: September 30th, 2025
Objective:
Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.
Standards:
CompTIA Security+ SYO-701 Objective: 5.2 – Explain elements of the risk management process
Guiding Question:
What are the factors used when calculating risk and how do you assign a value to risk?
Resources:
Assignment:
Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom .
Assigned: August 29th, 2025 Teacher Pacing Due Date: August 29th, 2025
Objective: Given a scenario, the student will analyze potential indicators to determine the type of attack.
Resources:
See PowerPoint presentation: 1.2.6 – Bots and Botnets.pptx
See PDF Document: Case Study – Botnet
Assignment:
Begin reading the 1.2.6 – Bots and Botnets .pptx presentation.
Read the Case Study – Botnet.pdf document and be prepared to answer the questions at the end.
Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Tuesday.
Assigned: April 24th, 2023 Teacher Pacing Due Date: April 25th, 2023
Objective:
The student will explain the techniques used in penetration testing.
Resources:
See PowerPoint presentations 1.8.1 – Pentesting.pptx, 1.8.2 – Pentest Exercise Types.pptx, and PDF document Case Study – Pen Testing.pdf
Assignment:
Begin reading the 1.8.1 – Pentesting.pptx and 1.8.2 – Pentest Exercise Types.pptx presentations.
Familiarize yourself with the purpose of penetration testing and some different ways of conducting this testing.
Read the Case Study – Pen Testing .pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today. This Case Study will be the final assignment of the 3rd Term.
Assigned: March 8th, 2023 Teacher Pacing Due Date: March 8th, 2023
Objective:
The student will summarize the techniques used in security assessments.
Resources:
See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf
Assignment:
Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
Read the Case Study – Bug Bounty .pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 7th, 2023 Teacher Pacing Due Date: March 8th, 2023
Objective:
The student will explain the security concerns associated with various types of vulnerabilities.
Resources:
See PowerPoint presentations 1.6.1 – Vulnerability Types.pptx ,1.6.2 – Vulnerability Impacts.pptx and PDF document Case Study – Zero Day Attack.pdf
Assignment:
Begin reading the 1.6.1 – Vulnerability Types.pptx and 1.6.2 – Vulnerability Impacts.pptx presentations.
Familiarize yourself with some common types of network security vulnerabilities and their impacts.
Read the Case Study – Zero Day Attack .pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 6th, 2023 Teacher Pacing Due Date: March 7th, 2023
Objective:
The student will explain different threat actors, vectors, and intelligence sources.
Resources:
See PowerPoint presentation: 1.5.2 – Threat Vectors.pptx and PDF document Case Study – Stuxnet 2023.pdf
Assignment:
Begin reading the 1.5.2 – Threat Vectors.pptx presentation.
Familiarize yourself with seven common threat vectors attackers can use to gain access to a network.
Read the Case Study – Stuxnet 2023.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 1st, 2023 Teacher Pacing Due Date: March 3rd, 2023
Objective:
The student will explain different threat actors, vectors, and intelligence sources.
Resources:
See PowerPoint presentation: 1.5.1 – Threat Actors.pptx and PDF document Case Study – Insider Threat.pdf
Assignment:
Begin reading the 1.5.1 – Threat Actors.pptx presentation.
Familiarize yourself with some common threat actors and their motives.
Read the Case Study – Insider Threat.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today.
Assigned: February 27th, 2023 Teacher Pacing Due Date: February 28th, 2023
Objective:
The student will compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentation: 1.1.14 – Influence Campaigns.pptx and PDF document Case Study – The Cybersecurity Problem with Influence Campaigns.pdf
Assignment:
Begin reading the 1.1.14 – Influence Campaigns.pptx presentation.
Familiarize yourself with the pattern and practice of Pretexting, and defenses against this type of social engineering technique.
Read the Case Study – The Cybersecurity Problem with Influence Campaigns.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the class period today.
Assigned: February 24th, 2023 Teacher Pacing Due Date: February 25th, 2023
Objective:
Summarize the basics of cryptographic concepts.
Resources:
See PDF Document: Case Study – Steganography.pdf
Assignment:
Begin reading the Case Study – Steganography.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom .
Please do your best to complete this Case Study by the end of the day today, Friday, December 2nd.
Assigned: December 2nd, 2022 Teacher Pacing Due Date: December 2nd, 2022
Posts navigation
It's dangerous to go alone!