Tag Archives: Spring 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2 – Network Storage Devices

Objective:

Students will be able to:

  • Identify network storage and its purpose.
  • Describe common types of network storage.
  • Distinguish between network storage and storage drives.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.3 Compare and compare storage types.

  • Volatile vs. non-volatile
  • Local storage
    • RAM
    • Read-only memory (ROM)
    • Storage drive
      • Magnetic disks/hard disk drive (HDD)
      • Solid-state drive (SSD)
      • Non-volatile memory express (NVMe)
    • Optical
    • External flash drives
  • Local network storage
    • Network-attached storage (NAS)
    • File server
    • Cloud storage service

Guiding Question:

What is network storage, its purpose, and how is it different than storage drives?

Resources:

  • Lesson Slides 2.3.2 – Network Storage Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
  3. Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx and the  Lab Slides 2.3.2 – Network File Access with SSH.pptx presentation to complete the Student Handout 2.3.2 – Network Storage Devices Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: February 3rd, 2026
Teacher Pacing Due Date: February 4th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Storage Devices

Objective:

Students will be able to:

  • Identify and describe volatile and non-volatile storage, and various local storage devices.
  • Distinguish between volatile and non-volatile storage, and various local storage devices.
  • Evaluate scenarios and determine what local storage device a user needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.3 Compare and compare storage types.

  • Volatile vs. non-volatile
  • Local storage
    • RAM
    • Read-only memory (ROM)
    • Storage drive
      • Magnetic disks/hard disk drive (HDD)
      • Solid-state drive (SSD)
      • Non-volatile memory express (NVMe)
    • Optical
    • External flash drives
  • Local network storage
    • Network-attached storage (NAS)
    • File server
    • Cloud storage service

Guiding Question:

How can a user identify and distinguish between volatile and non-volatile storage, and various local storage devices?

Resources:

  • Lesson Slides 2.3.1 – Storage Devices.pptx and Activity Slides 2.3.1 – Storage Devices Scenarios.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.3.1 – Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Activity Slides 2.3.1 – Storage Devices Scenarios.pptx Activity in class using the materials provided in Google Classroom.
  3. Use the information gathered in the Lesson Slides 2.3.1 – Storage Devices.pptx to complete the Student Handout 2.3.1 – Storage Devices Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: February 2nd, 2026
Teacher Pacing Due Date: February 3rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.7.1 – Internet Service Types

Objective:

Students will be able to:

  • Identify and describe different internet service types.
  • Compare internet service types based on their pros and cons.
  • Analyze situations and determine which internet service type best meets a user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.7 – Compare and contrast common internet service types.

  • Fiber optic
  • Cable
  • Digital subscriber line (DSL)
  • Wireless
    • RF
    • Satellite
    • Cellular

Guiding Question:

What are the different internet service types, and what should a user consider when choosing a service?

Resources:

  • Lesson Slides 2.7.1 – Internet Service Types.pptx and Activity Slides 2.7.1 – Internet Service Recommendation.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.7.1 – Internet Service Types.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the 2.7.1 – Internet Service Recommendation.pptx Activity in class using the materials provided in Google Classroom.
  3. Use the information gathered in the 2.7.1 – Internet Service Recommendation.pptx to complete the Student Handout 2.7.1 – Internet Service Types Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: January 28th, 2026
Teacher Pacing Due Date: January 29th, 2026

Lesson 2.2.1 Lab – Internal Computing – PC Hardware Disassembly & Reassembly

Objective:

  • I can demonstrate my understanding of PC Hardware fundamentals by disassembling a PC and successfully reassembling the PC so that I can better understand the internal hardware architecture of a common PC.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.2 – Explain the purpose of common internal computing components.

  • Motherboard/system board
  • Firmware/basic input/output system (BIOS)
  • Random-access memory (RAM)
  • Central processing unit (CPU)
  • Graphics processing unit (GPU)
  • Storage
  • Network interface card (NIC)
    • Wired vs. wireless
    • Onboard vs. expansion card

Resources:

Assignment:

  1. Follow along with the in-class demonstration to disassemble, inspect, and reassemble the internal components of a Dell Optiplex 780 PC workstation.
  2. Each student will open up their PC, remove and inspect the Hard Drive, RAM, Video Card and CPU, and identify and inspect the Motherboard, BIOS chip, Network Interface hardware and Expansion Slots.
  3. Acquire a philips head screwdriver from the front table and follow the in-class demonstration to carefully remove the heatsink assembly, exposing the CPU. Inspect the CPU and return it to its original socket. Then replace the heatsink assembly according to the provided in-class demonstration.
  4. Reassemble the PC and have Mister inspect it to complete and receive credit for today’s Lab Activity.

Posted: January 27th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.2.1 – Internal Computing Components

Objective:

Students will be able to:

  • Identify internal computing components.
  • Describe the purpose of internal computing components.
  • Explain how internal computing components compare to parts of the human body.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.2 – Explain the purpose of common internal computing components.

  • Motherboard/system board
  • Firmware/basic input/output system (BIOS)
  • Random-access memory (RAM)
  • Central processing unit (CPU)
  • Graphics processing unit (GPU)
  • Storage
  • Network interface card (NIC)
    • Wired vs. wireless
    • Onboard vs. expansion card

Guiding Question:

What are the internal components of computing devices and what are their purposes?

Resources:

  • 2.2.1 – Internal Computing Components.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.2.1 – Internal Computing Components.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.2.1 – CSI Computer System Investigation.pptx Activity in class using the materials provided in Google Classroom.
  3. Use the information gathered in the Lab Slides 2.2.1 – CSI Computer System Investigation.pptx to complete the Student Handout 2.2.1 – Internal Computing Components Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: January 23rd, 2026
Teacher Pacing Due Date: January 26th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.2 – Peripheral Devices

Objective:

Students will be able to:

  • Compare input and output interfaces for peripheral devices.
  • Analyze scenarios and determine which peripheral interface best meets the user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.5 – Compare and contrast common types of input/output device interfaces.

  • Peripheral devices
    • USB (A/B/C)
    • Thunderbolt
    • Bluetooth
    • Radio frequency (RF)
    • Lightning

Guiding Question:

What are the different input and output interfaces for peripheral devices and how do they work?

Resources:

  • Lesson 2.5.2 – Peripheral Devices.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.2 – Peripheral Devices.pptx presentation in today’s class.
  2. Complete the Student Handout 2.5.2 – Peripheral Devices Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 21st, 2026
Teacher Pacing Due Date: January 22nd, 2026

CYBER.ORG: AP Cybersecurity Spring 2026 – 1.3.1 – Copper Cables & 1.3.1 Activity – Ethernet Cat5e Patch Cable Assembly

Objective

  • The student will be able to summarize the types of cables and connectors and explain which is the appropriate type for a solution.

Resources:

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.5 – Compare and contrast common types of input/output device interfaces.See PowerPoint presentation: 1.3.1 – Copper Cables.pptx

  • Networking
    • Wired
      • Ethernet connector (RJ45)
    • Networking devices and tools

Guiding Question:

How are copper wire network cables constructed?

Links:

Topics Discussed:

  • Networking Basics
  • Networking Fundamentals
  • Ethernet
  • EIA/TIA
  • 568A & 568B Standards
  • Cat5, 5e & 6
  • Local Area Network
  • Cable Management

Assignment:

  1. Begin reading the 1.3.1 – Copper Cables.pptx presentation on the Google Classroom. This lesson will introduce you to different types of copper cables and their standard characteristics.
  2. Next, visit the How to Make a Network Cable: link at https://www.wikihow.com/Make-a-Network-Cable for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
  3. Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends, and a crimper tool.
  4. Follow the instructions to build your passthrough patch cable.
  5. Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for additional practice.
  6. Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
  7. Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.

Assigned: January 16th, 2026
Due Date: January 20th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Input Output Interfaces

Objective:

Students will be able to:

  • Distinguish between wired and wireless interfaces and explore the different options of each interface.
  • Identify different networking tools.
  • Apply their knowledge of wired and wireless interfaces to determine which best fits a user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.5 – Compare and contrast common types of input/output device interfaces.

  • Networking
    • Wired
      • Ethernet connector (RJ45)
      • Fiber connector small form-factor pluggable (SFP)
    • Wireless
      • Bluetooth
      • Near-field communication (NFC)
      • 802.11X
    • Networking devices and tools
      • Crimpers
      • Cable testers

Guiding Question:

How do wired and wireless interfaces impact networking?

Resources:

  • Lesson 2.5.1 – Input Output Interfaces.pptx Presentation available on Google Classroom

Assignment:

  1. Read the 2.5.1 – Input Output Interfaces.pptx presentation in today’s class.
  2. Complete the Student Handout 2.5.1 – Input Output Interfaces Check for Understanding activity using the materials provided in Google Classroom.

Assigned: January 9th, 2026
Teacher Pacing Due Date: January 12th, 2026

APCK Cyber: AP Cybersecurity – Topic 3.5 Analyzing Network Logs

Objectives:

  • Students will be able to analyze different types of log files collected from different network devices to determine abnormal activity that could indicate a possible network attack.

Standards:

  • 3.5.A Describe the types of automated security tools used to detect cyber attacks.
  • 3.5.C Analyze log files for indicators of network attacks.

Guiding Question:

How can log files can help identify threat actors or malicious activity?

Resources:

  • Information Security Career Video: https://youtu.be/cVZktAEtWE4
  • 3.5 Analyzing Network Logs PPT.pptx available on Google Classroom
  • 3.5 Network Log #1, #2 and #3 available in class.

Assignment:

  1. Read through the 3.5 Analyzing Network Logs PPT.pptx presentation in today’s class.
  2. Divide into groups of 2. You will be provided with Network Log #1, #2 and #3. We will work with these log files in class today.
  3. Work as a team to answer the questions on the back of Network Log #2 and #3. We will work with Network Log #1 as a whole group, then your group will be given time to analyze and answer the questions on the back of Network Log #2, then we will move on to Network Log #3.
  4. Follow along with the in-class presentation and complete the analysis questions on Network Log #2 and Network Log #3 to complete the Lab. We will discuss your results in class.

Assigned: January 14th, 2026
Teacher Pacing Due Date: January 14th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 4.8.1 – Incident Response

Objective:

  • Students will be able to investigate common incident response activities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.8 – Explain appropriate incident response activities

  • Process
    • Preparation
    • Detection
    • Analysis
    • Containment
    • Eradication
    • Recovery
    • Lessons learned
  • Training
  • Testing
    • Tabletop exercise
    • Simulation
  • Root cause analysis
  • Threat hunting
  • Digital forensics
    • Legal hold
    • Chain of custody
  • Acquisition
  • Reporting
  • Preservation
  • E-discovery

Guiding Question:

What are some common incident response activities?

Resources:

  • Lesson 4.8.1 – Incident Response.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.8.1 – Incident Response.pptx presentation in today’s class.
  2. Complete the Unit 3 – Incident Response Check for Understanding activity using the materials provided in Google Classroom.
  3. Complete the Lab – Cuckoo.pptx Activity in class using the materials provided in Google Classroom.
  4. To confirm completion the lab activity, upload a screenshot displaying the results of your Cuckoo analysis identifying the malware file to today’s Google Classroom post.

Assigned: January 12th, 2026
Teacher Pacing Due Date: January 13th, 2026