Students will be able to configure login settings for users to require industry standard security practices.
Standards:
4.3.A Describe managerial controls related to device security.
4.3.D Configure login settings to make a device more secure.
Guiding Question:
How do we create strong passwords, and why do we need them?
Resources:
4.3 Let’s Make Secure Passwords!.pptx, 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide and 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide available on Google Classroom
Assignment:
Read through the 4.3 Let’s Make Secure Passwords!.pptxpresentation in today’s class.
Divide into groups of 2. You are going to try to crack various “employee passwords” based on information the employees have shared online in class today.
Use the instructions and take notes in the 4.3 Let’s Make Secure Passwords! Password Complexity Activity Guide and answer the questions in the 4.3 Let’s Make Secure Passwords! Configuring Password Security Lab Guide. Work as a team to complete the lab by creating and cracking various types of passwords.
Assigned: March 5th, 2026 Teacher Pacing Due Date: March 6th, 2026
3A-NI-05 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04 Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How are passwords stored on a system and what is password hashing?
Resources:
Lesson Slides Lesson 1.1.4 – Password Hashing.pptx Presentation, Activity 1.1.4 – Hashing+Salts with CyberChef Activity and Activity 1.1.4 – Our Rainbow Table Google Sheet available on Google Classroom
Assignment:
Read the Lesson 1.1.4 – Password Hashing.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.4 – Hashing+Salts with CyberChef Activity using the Activity 1.1.4 – Our Rainbow Table Google Sheet provided in Google Classroom. (25 pts)
Assigned: March 3rd, 2026 Teacher Pacing Due Date: March 4th, 2026
Define database as a collection of data organized for efficient organization and retrieval.
Explain 3 password guessing attack methods that use database information.
Standards:
CSTA Compatibility Standards
3A-NI-05: Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How can databases be used in password guessing attacks?
Resources:
Lesson Slides Lesson 1.1.3 – Authentication and Password Attacks.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.3 – Authentication and Password Attacks.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.3 – Are You at Risk Student Worksheet Lab Activity using the materials provided in Google Classroom. (25 pts)
Assigned: March 2nd, 2026 Teacher Pacing Due Date: March 3rd, 2026
Apply best practices for creating a safe password.
Standards:
CSTA Compatibility Standards
3A-CS-02: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How do authentication and strong passwords help secure data?
Resources:
Lesson Slides Lesson 1.1.2 – Authentication.pptx and Activity 1.1.2 – Creating a Safe Password.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.2 – Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Activity 1.1.2 – Creating a Safe Password.pptx presentation to complete theActivity 1.1.2 – Testing Password Strength document using the materials provided in Google Classroom. (25 pts)
Assigned: February 27th, 2026 Teacher Pacing Due Date: March 2nd, 2026
Identify the key goals and frameworks of Cybersecurity
Identify the CIA triad as the characteristics of information
Identify the state of information as stored, transmission, and processing
Standards:
CSTA Compatibility Standards
3A-NI-08: Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Guiding Question:
How does the protection of the CIA triad lead to the security of data?
Resources:
Lesson Slides 1.1.1 Intro to Security Concepts.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.1 – Intro to Security Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 1.1.1 – Intro to Security Concepts.pptx presentation to complete theActivity 1.1.1 – CIA Triad Scenarios Worksheet using the materials provided in Google Classroom. (25 pts)
Assigned: February 26th, 2026 Teacher Pacing Due Date: February 27th, 2026
Establish differences between circuit switching and packet switching
Define protocols and TCP/IP suite
Explain how protocols use ports/well-known port numbers
Compare and contract TCP and UDP transport protocols
Examine how TCP uses the 3-way handshake
Perform network traffic analysis using the Wireshark tool
Standards:
CSTA Compatibility Standards
3A-CS-01: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Guiding Question:
How are packets delivered across networks between devices?
Resources:
Lesson Slides Lesson 5.3.2 – Packet Delivery and Protocols.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 5.3.2 – Packet Delivery and Protocols.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lab 5.3.2 – Instructor PPT Packet Analysis with Wireshark.pptx presentation to complete theLab 5.3.2 – Packet Analysis with Wireshark Student Worksheet Lab Activity using the materials provided in Google Classroom. (50 pts)
Assigned: February 24th, 2026 Teacher Pacing Due Date: February 25th, 2026
Understand analog method of message delivery as a single communication
Devise a delivery method for messages that are broken up into packets
Standards:
CSTA Compatibility Standards
3A-CS-01: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
Guiding Question:
How can students communicate in the mobster net activity?
Resources:
Lesson Slides Lesson 5.3.1 – Communicating in a Network.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 5.3.1 – Communicating in a Network.pptx Microsoft PowerPoint slideshow in today’s class.
Gather in groups of three and use the instructions in the Lesson 5.3.1 – Communicating in a Network.pptx presentation to complete theMobster Net in-class Lab Activity to understand how networks deliver messages. (50 pts)
Assigned: February 23rd, 2026 Teacher Pacing Due Date: February 23rd, 2026
Define how naming and identifying are used in networking
Explore the Wireshark tool used to capture and analyze network packets
Standards:
CYBER.ORG Cybersecurity Learning Standards:
6-8.CS.COMM.2 -Differentiate between a network device’s MAC and IP addresses.
Guiding Question:
How are devices on a network identified and what are some ways they can communicate?
Resources:
Lesson Slides Lesson 5.2.2 – Network Naming.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 5.2.2 – Network Naming.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 5.2.2 – Network Naming.pptx presentation to complete theLab 5.2.2 – ARP with Wireshark.pptx Lab Activity using the materials provided in Google Classroom. (50 pts)
Assigned: February 20th, 2026 Teacher Pacing Due Date: February 23rd, 2026
Identify characteristics of central connection devices
Standards:
CompTIA Security+ Objectives: 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. • Segmentation
4.1 Given a scenario, apply common security techniques to computing resources. • Hardening Targets • Switches, Routers, Servers
Guiding Question:
What is the difference between a WAN and a LAN and what are some basic network components?
Resources:
Lesson Slides Lesson 5.2.1 – Network Components.pptx and Student Handout 2.1.2 – IoT Devices.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 5.2.1 – Network Components.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 5.2.1 – Network Components.pptx presentation to complete theActivity 5.2.1 – Network Puzzle WorksheetCheck for Understanding activity using the materials provided in Google Classroom. (25 pts)
Assigned: February 9th, 2026 Teacher Pacing Due Date: February 10th, 2026