Students will be able to analyze a cyber attack, including identifying the phases of the attack, internalizing key learnings for future protection, and sharing an analysis of the attack with a non-technical audience.
Standards:
1.1.A Describe types of adversaries and their motivations.
1.1.B Determine the type of attack used by a cyber adversary.
1.1.C Determine the phases used in a cyber attack.
Guiding Question:
What are the common elements of a Cyber Attack?
Resources:
1.1 Analyzing Cyber Attacks PPT.pptx Presentation available on Google Classroom
Assignment:
Read through the 1.1 Analyzing Cyber Attacks PPT.pptx presentation in today’s class.
Divide into groups of 2 – 3, your group will receive a specific historical cyber attack to research.
Work as a team to complete the Cyber Attacks Case Study Analysis document available in the Google Classroom to research your assigned attack.
You will be using the information your group collects on this graphic organizer to write a brief synopsis of your assigned attack including:
Who the adversaries carrying out the attack were,
How the attack happened
What the impact of the attack was
Who was impacted
You will be sharing your information with the class on Monday via a 3–5-minute presentation.
Many other information sources for these attacks are available beyond the provided articles. You are encouraged to use any and all resources available to you to go beyond the provided resources.
Presentations will take place during Monday’s class meeting, and each team member will be expected to contribute, so prepare your materials accordingly.
Students will be able to explain the elements of risk analysis, discuss various ways organizations calculate risk and explain how risk is reported and how it has an impact on business operations.
Standards:
CompTIA Security+ SYO-701 Objective: 5.2 – Explain elements of the risk management process
Guiding Question:
What are the factors used when calculating risk and how do you assign a value to risk?
Resources:
5.2.1 – Risk Management.pptx Presentation available on Google Classroom
Assignment:
Follow along with the 5.2.1 – Risk Management.pptx presentation in today’s class.
Complete the Case Study – Failure to Disclose Activity in class using the materials provided in Google Classroom.
Assigned: August 29th, 2025 Teacher Pacing Due Date: August 29th, 2025
Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface on Monday.