Objectives:
- Students will be able to apply asymmetric encryption algorithms to encrypt and decrypt data.
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions.
- Encryption
- Asymmetric
- Symmetric
- Key exchange
- Algorithms
Guiding Question:
How does Assymetric Cryptography power modern communications?
Resources:
- 5.4 Asymmetric Cryptography.pptx and 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide available on Google Classroom
Assignment:
- Read through the 5.4 Asymmetric Cryptography.pptx presentation in today’s class. We will use the information in the presentation along with what we learned yesterday about Asymmetric Cryptography to complete an in-class Lab Activity.
- Follow the instructions provided in the 5.4 – Asymmetric Cryptography: Secrets – Student Activity Guide in today’s Google Classroom Assignment Post to complete the lab activity.
Assigned: April 9th, 2026
Teacher Pacing Due Date: April 10th, 2026
Objective:
- Identify the strengths of using asymmetric encryption
- Explain the steps involved with asymmetric encryption
Standards:
CompTIA Security+ Objective(s)
1.4 Explain the importance of using appropriate cryptographic solutions.
- Public key infrastructure (PKI)
- Public key
- Private key
- Key escrow
- Encryption
- Asymmetric
- Key exchange
- Algorithms
- Key length
Guiding Question:
How does asymmetric encryption allow the protection of sensitive information without the difficulty of sharing secret keys?
Resources:
- Lesson 10.1.2 – Asymmetric Encryption.pptx presentation and Activity 10.1.2- Investigating RSA keypairs form available on Google Classroom
Assignment:
- Read the Lesson 10.1.2 – Asymmetric Encryption.pptx presentation in today’s class.
- Choose a partner and complete Part A of the Activity 10.1.2- Investigating RSA keypairs Google Form provided in the Google Classroom. Answer the three Part A: Closing questions for discussion in your form.
- Proceed to Part B, and paste a screenshot of the decrypted message received from your partner in Cyberchef into the Form to complete the lab. (50 pts)
Assigned: April 8th, 2026
Teacher Pacing Due Date: April 9th, 2026
Objective:
- Identify the importance of using encryption policies when sending information
- Explain the steps involved with symmetric encryption
Standards:
CompTIA Security+ SYO-701 Objective:
1.4 – Explain the importance of using appropriate cryptographic solutions
- Encryption
- Symmetric
- Key exchange
- Algorithms
- Key length
- Tools
- Trusted Platform Module (TPM)
Guiding Question:
How does encryption protect against a loss of confidentiality of sensitive information and what steps are involved in symmetric encryption?
Resources:
- Lesson 10.1.1 – Symmetric Encryption.pptx presentation and Activity 10.1.1 – Creating a Key Exchange Method form available on Google Classroom
Assignment:
- Read the Lesson 10.1.1 – Symmetric Encryption.pptx presentation in today’s class.
- Choose a partner and complete Part 1 of the Activity 10.1.1 – Creating a Key Exchange Method Google Form provided in the Google Classroom.
- We will go around the room describing the “Key Exchange” solutions devised by our groups and assess their strengths and weaknesses. Use the in-class discussion to complete Part 2 of the Activity and hand in the completed Activity form for credit (50 points)
Assigned: April 6th, 2026
Teacher Pacing Due Date: April 7th, 2026
Objective:
Students will be able to:
- Establish differences between circuit switching and packet switching
- Define protocols and TCP/IP suite
- Explain how protocols use ports/well-known port numbers
- Compare and contract TCP and UDP transport protocols
- Examine how TCP uses the 3-way handshake
- Perform network traffic analysis using the Wireshark tool
Standards:
CSTA Compatibility Standards
- 3A-CS-01: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
- 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Guiding Question:
How are packets delivered across networks between devices?
Resources:
- Lesson Slides Lesson 5.3.2 – Packet Delivery and Protocols.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
- Read the Lesson 5.3.2 – Packet Delivery and Protocols.pptx Microsoft PowerPoint slideshow in today’s class.
- Use the instructions in the Lab 5.3.2 – Instructor PPT Packet Analysis with Wireshark.pptx presentation to complete the Lab 5.3.2 – Packet Analysis with Wireshark Student Worksheet Lab Activity using the materials provided in Google Classroom. (50 pts)
Assigned: February 24th, 2026
Teacher Pacing Due Date: February 25th, 2026
It's dangerous to go alone!