Objective:
Students will be able to:
Distinguish between wired and wireless interfaces and explore the different options of each interface.
Identify different networking tools.
Apply their knowledge of wired and wireless interfaces to determine which best fits a user’s needs.
Standards:
CompTIA Tech+ FC0-U71 Objective : 2.5 – Compare and contrast common types of input/output device interfaces.
Networking
Wired
Ethernet connector (RJ45)
Fiber connector small form-factor pluggable (SFP)
Wireless
Bluetooth
Near-field communication (NFC)
802.11X
Networking devices and tools
Guiding Question:
How do wired and wireless interfaces impact networking?
Resources:
Lesson 2.5.1 – Input Output Interfaces.pptx Presentation available on Google Classroom
Assignment:
Read the 2.5.1 – Input Output Interfaces .pptx presentation in today’s class.
Complete the Student Handout 2.5.1 – Input Output Interfaces Check for Understanding activity using the materials provided in Google Classroom .
Assigned: January 9th, 202 6Teacher Pacing Due Date: January 12th, 2026
Objective:
Students will be able to analyze how logs can be used to support an investigation.
Standards:
CompTIA Security+ SYO-701 Objective: 4.9 – Given a scenario, use data sources to support an investigation
Log data
Firewall logs
Application logs
Endpoint logs
OS-specific security logs
IPS/IDS logs
Network logs
Metadata
Data sources
Vulnerability scans
Automated reports
Dashboards
Packet captures
Guiding Question:
How can logs be used to support an investigation?
Resources:
Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.9.1 – Logs .pptx presentation in today’s class.
Complete the Unit 3 – Logs Check for Understanding activity using the materials provided in Google Classroom .
Complete the Lab – Metadata.pptx Activity in class using the materials provided in Google Classroom .
To confirm completion the lab activity, upload a screenshot displaying the metadata displayed when using exiftool on the target image file to today’s Google Classroom post.
Assigned: January 13th, 2026 Teacher Pacing Due Date: January 14th, 2026
Objective:
Students will be able to investigate common incident response activities.
Standards:
CompTIA Security+ SYO-701 Objective: 4.8 – Explain appropriate incident response activities
Process
Preparation
Detection
Analysis
Containment
Eradication
Recovery
Lessons learned
Training
Testing
Tabletop exercise
Simulation
Root cause analysis
Threat hunting
Digital forensics
Legal hold
Chain of custody
Acquisition
Reporting
Preservation
E-discovery
Guiding Question:
What are some common incident response activities?
Resources:
Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.8.1 – Incident Response .pptx presentation in today’s class.
Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom .
Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom .
To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.
Assigned: January 12th, 2026 Teacher Pacing Due Date: January 13th, 2026
Objective:
Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.
Standards:
CompTIA Security+ SYO-701 Objective: 2.5 – Explain the purpose of mitigation techniques used to secure the enterprise
Segmentation
Access control
Access control list (ACL)
Permissions
Application allow list
Isolation
Patching
Encryption
Monitoring
Least privilege
Configuration enforcement
Decommissioning
Guiding Question:
What are common mitigation techniques that can be used to secure the enterprise?
Resources:
Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.5.1 – Mitigation Techniques .pptx presentation in today’s class.
Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom .
Assigned: January 5th, 2025 Teacher Pacing Due Date: January 6th, 2025
Objective:
Students will be able to implement secure network designs.
Standards:
CompTIA Security+ SYO-701 Objective: 3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
Infrastructure considerations
Network Appliances
Jump Server
Proxy Server
Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
Load balancer
Sensors
Guiding Question:
How are network appliances secured?
Resources:
Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.2.2 – Network Appliances .pptx presentation in today’s class.
Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom .
Assigned: December 12th, 2025 Teacher Pacing Due Date: December 15th, 2025
Objective:
Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.
Standards:
CompTIA Security+ SYO-701 Objective: 4.5 – Given a scenario, modify enterprise capabilities to enhance security
Firewalls
Rules
Access lists
Ports/protocols
Screened subnets
IDS/IPS
Web filter
Agent-based
Centralized proxy
Universal Resource Locator (URL) scanning
Content categorization
Block rules
Reputation
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter .pptx presentation in today’s class.
Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom .
Assigned: December 11th, 2025 Teacher Pacing Due Date: December 12th, 2025
Objective:
Students will compare various types of infrastructure security systems.
Standards:
CompTIA Security+ SYO-701 Objective: 3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
Infrastructure considerations
Device placement
Security zones
Attack surface
Connectivity
Failure modes
Device attribute
Active vs passive
Inline vs tap/monitor
Port security
802.1X
Extensible Authentication Protocol (EAP)
Firewall types
Web application firewall (WAF)
Unified threat management (UTM)
Next-generation firewall (NGFW)
Layer 4/Layer 7
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.2.1 – Infrastructure Considerations .pptx presentation in today’s class.
Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom .
Assigned: December 10th, 2025 Teacher Pacing Due Date: December 11th, 2025
Objective:
Students will analyze common architecture considerations.
Standards:
CompTIA Security+ SYO-701 Objective: 3.1 – Compare and contrast security implications of different architecture models
Considerations
Availability
Resilience
Cost
Responsiveness
Scalability
Risk transference
Ease of recovery
Patch availability
Inability to patch
Power
Compute
Guiding Question:
What are common architecture considerations?
Resources:
Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 3.1.2 – Architecture Considerations .pptx presentation in today’s class.
Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom .
Assigned: December 9th, 2025 Teacher Pacing Due Date: December 10th, 2025
Objective:
Students will investigate mobile solutions.
Standards:
CompTIA Security+ SYO-701 Objective: 4.1 – Given a scenario, apply common security techniques to computing
Mobile solutions
Mobile device management (MDM)
Deployment models
Bring your own device (BYOD)
Corporate-owned, personally enabled (COPE)
Choose your own device (CYOD)
Connection methods
Guiding Question:
What are common mobile solutions?
Resources:
Assignment:
Read the Lesson 4.1.3 – Mobile Solutions .pptx presentation in today’s class.
Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 8th, 2025 Teacher Pacing Due Date: December 9th, 2025
Objective:
Students will analyze potential supply chain issues and how to mitigate them.
Standards:
CompTIA Security+ SYO-701 Objective: 2.3 – Explain various types of vulnerabilities
Supply chain
Service provider
Hardware provider
Software provider
Cryptographic
Misconfiguration
Mobile device
Side loading
Jailbreaking
Zero-day
Guiding Question:
What are common supply chain issues and how can they be mitigated?
Resources:
Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities .pptx presentation in today’s class.
Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom .
Assigned: December 5th, 2025 Teacher Pacing Due Date: December 8th, 2025
Posts navigation
It's dangerous to go alone!