Tag Archives: CYBER.ORG

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Input Output Interfaces

Objective:

Students will be able to:

  • Distinguish between wired and wireless interfaces and explore the different options of each interface.
  • Identify different networking tools.
  • Apply their knowledge of wired and wireless interfaces to determine which best fits a user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.5 – Compare and contrast common types of input/output device interfaces.

  • Networking
    • Wired
      • Ethernet connector (RJ45)
      • Fiber connector small form-factor pluggable (SFP)
    • Wireless
      • Bluetooth
      • Near-field communication (NFC)
      • 802.11X
    • Networking devices and tools
      • Crimpers
      • Cable testers

Guiding Question:

How do wired and wireless interfaces impact networking?

Resources:

  • Lesson 2.5.1 – Input Output Interfaces.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 2.5.1 – Input Output Interfaces.pptx presentation in today’s class.
  2. Complete the Student Handout 2.5.1 – Input Output Interfaces Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 9th, 2026
Teacher Pacing Due Date: January 12th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.9.1 – Logs

Objective:

  • Students will be able to analyze how logs can be used to support an investigation.

Standards:

CompTIA Security+ SYO-701 Objective:

4.9 – Given a scenario, use data sources to support an investigation

  • Log data
    • Firewall logs
    • Application logs
    • Endpoint logs
    • OS-specific security logs
    • IPS/IDS logs
    • Network logs
    • Metadata
  • Data sources
    • Vulnerability scans
    • Automated reports
    • Dashboards
    • Packet captures

Guiding Question:

How can logs be used to support an investigation?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.9.1 – Logs.pptx presentation in today’s class.
  2. Complete the Unit 3 – Logs Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Metadata.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the metadata displayed when using exiftool on the target image file to today’s Google Classroom post.

Assigned: January 13th, 2026
Teacher Pacing Due Date: January 14th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.8.1 – Incident Response

Objective:

  • Students will be able to investigate common incident response activities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.8 – Explain appropriate incident response activities

  • Process
    • Preparation
    • Detection
    • Analysis
    • Containment
    • Eradication
    • Recovery
    • Lessons learned
  • Training
  • Testing
    • Tabletop exercise
    • Simulation
  • Root cause analysis
  • Threat hunting
  • Digital forensics
    • Legal hold
    • Chain of custody
  • Acquisition
  • Reporting
  • Preservation
  • E-discovery

Guiding Question:

What are some common incident response activities?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.8.1 – Incident Response.pptx presentation in today’s class.
  2. Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.

Assigned: January 12th, 2026
Teacher Pacing Due Date: January 13th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Mitigation Techniques

Objective:

  • Students will be able to explain the purpose of mitigation techniques used to secure the enterprise.

Standards:

CompTIA Security+ SYO-701 Objective:

2.5 – Explain the purpose of mitigation techniques used to secure the enterprise

  • Segmentation
  • Access control
    • Access control list (ACL)
    • Permissions
  • Application allow list
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least privilege
  • Configuration enforcement
  • Decommissioning

Guiding Question:

What are common mitigation techniques that can be used to secure the enterprise?

Resources:

  • Lesson 2.5.1 – Mitigation Techniques.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Mitigation Techniques.pptx presentation in today’s class.
  2. Complete the Unit 3 – Mitigation Techniques activity using the materials provided in Google Classroom.

Assigned: January 5th, 2025
Teacher Pacing Due Date: January 6th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.2.2 – Network Appliances

Objective:

  • Students will be able to implement secure network designs.

Standards:

CompTIA Security+ SYO-701 Objective:

3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Network Appliances
      • Jump Server
      • Proxy Server
      • Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
      • Load balancer
      • Sensors

Guiding Question:

How are network appliances secured?

Resources:

  • Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.2 – Network Appliances.pptx presentation in today’s class.
  2. Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom.

Assigned: December 12th, 2025
Teacher Pacing Due Date: December 15th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter

Objective:

  • Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.

Standards:

CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security

  • Firewalls
    • Rules
    • Access lists
    • Ports/protocols
    • Screened subnets
  • IDS/IPS
    • Trends
    • Signatures
  • Web filter
    • Agent-based
    • Centralized proxy
    • Universal Resource Locator (URL) scanning
    • Content categorization
    • Block rules
    • Reputation

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx presentation in today’s class.
  2. Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom.

Assigned: December 11th, 2025
Teacher Pacing Due Date: December 12th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.2.1 – Infrastructure Considerations

Objective:

  • Students will compare various types of infrastructure security systems.

Standards:

CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure

  • Infrastructure considerations
    • Device placement
    • Security zones
    • Attack surface
    • Connectivity
    • Failure modes
      • Fail-open
      • Fail-closed
    • Device attribute
      • Active vs passive
      • Inline vs tap/monitor
    • Port security
      • 802.1X
      • Extensible Authentication Protocol (EAP)
    • Firewall types
      • Web application firewall (WAF)
      • Unified threat management (UTM)
      • Next-generation firewall (NGFW)
      • Layer 4/Layer 7

Guiding Question:

What is the best way to secure an organization’s infrastructure?

Resources:

  • Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.2.1 – Infrastructure Considerations.pptx presentation in today’s class.
  2. Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom.

Assigned: December 10th, 2025
Teacher Pacing Due Date: December 11th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 3.1.2 – Architecture Considerations

Objective:

  • Students will analyze common architecture considerations.

Standards:

CompTIA Security+ SYO-701 Objective:
3.1 – Compare and contrast security implications of different architecture models

  • Considerations
    • Availability
    • Resilience
    • Cost
    • Responsiveness
    • Scalability
    • Risk transference
    • Ease of recovery
    • Patch availability
    • Inability to patch
    • Power
    • Compute

Guiding Question:

What are common architecture considerations?

Resources:

  • Lesson 3.1.2 – Architecture Considerations.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 3.1.2 – Architecture Considerations.pptx presentation in today’s class.
  2. Complete the Lesson 3.1.2 – Architecture Considerations – Guided Notes – Fall 2025 Form using the materials provided in Google Classroom.

Assigned: December 9th, 2025
Teacher Pacing Due Date: December 10th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.3 – Mobile Solutions

Objective:

  • Students will investigate mobile solutions.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Mobile solutions
    • Mobile device management (MDM)
    • Deployment models
      • Bring your own device (BYOD)
      • Corporate-owned, personally enabled (COPE)
      • Choose your own device (CYOD)
    • Connection methods
      • Cellular
      • Wi-Fi
      • Bluetooth

Guiding Question:

What are common mobile solutions?

Resources:

  • Lesson 4.1.3 – Mobile Solutions.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.3 – Mobile Solutions.pptx presentation in today’s class.
  2. Complete the Case Study – Geolocation.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 8th, 2025
Teacher Pacing Due Date: December 9th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities

Objective:

  • Students will analyze potential supply chain issues and how to mitigate them.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Supply chain
    • Service provider
    • Hardware provider
    • Software provider
  • Cryptographic
  • Misconfiguration
  • Mobile device
    • Side loading
    • Jailbreaking
  • Zero-day

Guiding Question:

What are common supply chain issues and how can they be mitigated?

Resources:

  • Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.4 – Supply Chain, Zero-day, and Cryptographic Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – Zero Day Attack.pdf Activity in class using the materials provided in Google Classroom.

Assigned: December 5th, 2025
Teacher Pacing Due Date: December 8th, 2025