Tag Archives: Lab Assignment

CYBER.ORG: AP Cybersecurity – 5.3.1 – Communicating in a Network

Objective:

Students will be able to:

  • Understand analog method of message delivery as a single communication
  • Devise a delivery method for messages that are broken up into packets

Standards:

CSTA Compatibility Standards

  • 3A-CS-01: Compare levels of abstraction and interactions between application software, system software, and hardware layers.

Guiding Question:

How can students communicate in the mobster net activity?

Resources:

  • Lesson Slides Lesson 5.3.1 – Communicating in a Network.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 5.3.1 – Communicating in a Network.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Gather in groups of three and use the instructions in the Lesson 5.3.1 – Communicating in a Network.pptx presentation to complete the Mobster Net in-class Lab Activity to understand how networks deliver messages. (50 pts)

Assigned: February 23rd, 2026
Teacher Pacing Due Date: February 23rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 5.2.2 – Network Naming

Objective:

Students will be able to:

  • Define how naming and identifying are used in networking
  • Explore the Wireshark tool used to capture and analyze network packets

Standards:

CYBER.ORG Cybersecurity Learning Standards:

  • 6-8.CS.COMM.2 -Differentiate between a network device’s MAC and IP addresses.

Guiding Question:

How are devices on a network identified and what are some ways they can communicate?

Resources:

  • Lesson Slides Lesson 5.2.2 – Network Naming.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 5.2.2 – Network Naming.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Use the instructions in the Lesson 5.2.2 – Network Naming.pptx presentation to complete the Lab 5.2.2 – ARP with Wireshark.pptx Lab Activity using the materials provided in Google Classroom. (50 pts)

Assigned: February 20th, 2026
Teacher Pacing Due Date: February 23rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.8.1 – Lab Activity: Know Your Network

Objective:

Students will be able to:

  • Recognize how protocols, IP addresses, and ports are used to send and receive data on a network.
  • Identify the function of common networking devices and services.
  • Use built-in network tools to examine a device’s network configuration and connectivity.

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.8 – Identify basic networking concepts.

  • Basics of Network Communication
  • Network identifiers
  • IP address
  • Media access control (MAC) address
  • Ports
  • Basic network services
  • Secure web browsing
  • File transfer
  • Email
  • Network devices
  • Modem
  • Router
  • Switch
  • Access point
  • Firewall
  • Networking models
  • Client/server
  • Peer-to-peer
  • Local area network (LAN)
  • Wide area network (WAN)

Guiding Question:

How do devices know where to send data on a network, and what makes that communication work?

Resources:

  • Lab Slides 2.8.1 – Know Your Network.pptx presentations and Student Handout 2.8.1 – Basic Network Concepts available on Google Classroom

Assignment:

  1. Review the Lesson Slides 2.8.1 – Basic Network Concepts.pptx Microsoft PowerPoint slideshow presented in class last Friday.
  2. If you have not already, please complete first half of the Student Handout 2.8.1 – Basic Network Concepts Check for Understanding activity using the materials provided in Google Classroom. (25 pts)
  3. Use the information in the Lab Slides 2.8.1 – Know Your Network.pptx presentation to complete the second half of the Student Handout 2.8.1 – Basic Network Concepts document by end of day today. (25 pts)

Assigned: February 17th, 2026
Teacher Pacing Due Date: February 17th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.8.1 – Basic Network Concepts

Objective:

Students will be able to:

  • Recognize how protocols, IP addresses, and ports are used to send and receive data on a network.
  • Identify the function of common networking devices and services.
  • Use built-in network tools to examine a device’s network configuration and connectivity.

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.8 – Identify basic networking concepts.

  • Basics of Network Communication
  • Network identifiers
  • IP address
  • Media access control (MAC) address
  • Ports
  • Basic network services
  • Secure web browsing
  • File transfer
  • Email
  • Network devices
  • Modem
  • Router
  • Switch
  • Access point
  • Firewall
  • Networking models
  • Client/server
  • Peer-to-peer
  • Local area network (LAN)
  • Wide area network (WAN)

Guiding Question:

How do devices know where to send data on a network, and what makes that communication work?

Resources:

  • Lesson Slides 2.8.1 – Basic Network Concepts.pptx and Lab Slides 2.8.1 – Know Your Network.pptx presentations and Student Handout 2.8.1 – Basic Network Concepts available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.8.1 – Basic Network Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete first half of the Student Handout 2.8.1 – Basic Network Concepts Check for Understanding activity using the materials provided in Google Classroom. (25 pts)
  3. Use the information in the Lab Slides 2.8.1 – Know Your Network.pptx presentation to complete the second half of the Student Handout 2.8.1 – Basic Network Concepts document by end of day on Tuesday, February 17th. (25 pts)

Assigned: February 12th, 2026
Teacher Pacing Due Date: February 17th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2 – Network Storage Devices

Objective:

Students will be able to:

  • Identify network storage and its purpose.
  • Describe common types of network storage.
  • Distinguish between network storage and storage drives.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.3 Compare and compare storage types.

  • Volatile vs. non-volatile
  • Local storage
    • RAM
    • Read-only memory (ROM)
    • Storage drive
      • Magnetic disks/hard disk drive (HDD)
      • Solid-state drive (SSD)
      • Non-volatile memory express (NVMe)
    • Optical
    • External flash drives
  • Local network storage
    • Network-attached storage (NAS)
    • File server
    • Cloud storage service

Guiding Question:

What is network storage, its purpose, and how is it different than storage drives?

Resources:

  • Lesson Slides 2.3.2 – Network Storage Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
  3. Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx and the  Lab Slides 2.3.2 – Network File Access with SSH.pptx presentation to complete the Student Handout 2.3.2 – Network Storage Devices Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: February 3rd, 2026
Teacher Pacing Due Date: February 4th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.2.1 – Internal Computing Components

Objective:

Students will be able to:

  • Identify internal computing components.
  • Describe the purpose of internal computing components.
  • Explain how internal computing components compare to parts of the human body.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.2 – Explain the purpose of common internal computing components.

  • Motherboard/system board
  • Firmware/basic input/output system (BIOS)
  • Random-access memory (RAM)
  • Central processing unit (CPU)
  • Graphics processing unit (GPU)
  • Storage
  • Network interface card (NIC)
    • Wired vs. wireless
    • Onboard vs. expansion card

Guiding Question:

What are the internal components of computing devices and what are their purposes?

Resources:

  • 2.2.1 – Internal Computing Components.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.2.1 – Internal Computing Components.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.2.1 – CSI Computer System Investigation.pptx Activity in class using the materials provided in Google Classroom.
  3. Use the information gathered in the Lab Slides 2.2.1 – CSI Computer System Investigation.pptx to complete the Student Handout 2.2.1 – Internal Computing Components Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: January 23rd, 2026
Teacher Pacing Due Date: January 26th, 2026

CYBER.ORG: AP Cybersecurity Spring 2026 – 1.3.1 – Copper Cables & 1.3.1 Activity – Ethernet Cat5e Patch Cable Assembly

Objective

  • The student will be able to summarize the types of cables and connectors and explain which is the appropriate type for a solution.

Resources:

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.5 – Compare and contrast common types of input/output device interfaces.See PowerPoint presentation: 1.3.1 – Copper Cables.pptx

  • Networking
    • Wired
      • Ethernet connector (RJ45)
    • Networking devices and tools

Guiding Question:

How are copper wire network cables constructed?

Links:

Topics Discussed:

  • Networking Basics
  • Networking Fundamentals
  • Ethernet
  • EIA/TIA
  • 568A & 568B Standards
  • Cat5, 5e & 6
  • Local Area Network
  • Cable Management

Assignment:

  1. Begin reading the 1.3.1 – Copper Cables.pptx presentation on the Google Classroom. This lesson will introduce you to different types of copper cables and their standard characteristics.
  2. Next, visit the How to Make a Network Cable: link at https://www.wikihow.com/Make-a-Network-Cable for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
  3. Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends, and a crimper tool.
  4. Follow the instructions to build your passthrough patch cable.
  5. Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for additional practice.
  6. Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
  7. Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.

Assigned: January 16th, 2026
Due Date: January 20th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.9.1 – Logs

Objective:

  • Students will be able to analyze how logs can be used to support an investigation.

Standards:

CompTIA Security+ SYO-701 Objective:

4.9 – Given a scenario, use data sources to support an investigation

  • Log data
    • Firewall logs
    • Application logs
    • Endpoint logs
    • OS-specific security logs
    • IPS/IDS logs
    • Network logs
    • Metadata
  • Data sources
    • Vulnerability scans
    • Automated reports
    • Dashboards
    • Packet captures

Guiding Question:

How can logs be used to support an investigation?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.9.1 – Logs.pptx presentation in today’s class.
  2. Complete the Unit 3 – Logs Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Metadata.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the metadata displayed when using exiftool on the target image file to today’s Google Classroom post.

Assigned: January 13th, 2026
Teacher Pacing Due Date: January 14th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.8.1 – Incident Response

Objective:

  • Students will be able to investigate common incident response activities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.8 – Explain appropriate incident response activities

  • Process
    • Preparation
    • Detection
    • Analysis
    • Containment
    • Eradication
    • Recovery
    • Lessons learned
  • Training
  • Testing
    • Tabletop exercise
    • Simulation
  • Root cause analysis
  • Threat hunting
  • Digital forensics
    • Legal hold
    • Chain of custody
  • Acquisition
  • Reporting
  • Preservation
  • E-discovery

Guiding Question:

What are some common incident response activities?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.8.1 – Incident Response.pptx presentation in today’s class.
  2. Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.

Assigned: January 12th, 2026
Teacher Pacing Due Date: January 13th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2, Pt. 2 – Cross-site Scripting (XSS) Lab

Objective:

  • Students will analyze potential indicators associated with vulnerabilities in operating system and web-based attacks.

Standards:

CompTIA Security+ SYO-701 Objective:

2.3 – Explain various types of vulnerabilities

  • Operating system (OS)-based
  • Web-based
    • Structured Query Language injection (SQLi)
    • Cross-site scripting (XSS)

Guiding Question:

What are some vulnerabilities in operating systems and web applications that can lead to malicious attacks?

Resources:

  • Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx and Lab – XSS DVWA.pptx Presentations available on Google Classroom

Assignment:

  1. Review the Lesson 2.3.2 – OS and Web-based Vulnerabilities.pptx presentation, if necessary.
  2. Complete the Lab – XSS DVWA.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying the Session ID (PHPSESSID) using the XSS (Reflected) Vulnerability attack to today’s Google Classroom post.

Assigned: December 3rd, 2025
Teacher Pacing Due Date: December 4th, 2025