Tag Archives: Student Handout

CYBER.ORG: AP Cybersecurity – Lesson 1.1.5 – Methods of Authentication

Objective:

Students will be able to:

  • Define alternatives to passwords for authentication.
  • Demonstrate an understanding of various methods of authentication
  • Make a convincing argument as to what methods of authentication would best accomplish their assigned goal.

Standards:

CSTA Compatibility Standards

  • 3A-NI-06: Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  • 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
  • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

Guiding Question:

What are various methods of authentication?

Resources:

  • Lesson Slides 1.1.5 – Methods of Authentication.pptx Presentation, Activity 1.1.5 – Which Authentication Activity available on Google Classroom

Assignment:

  1. Read the 1.1.5 – Methods of Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete the Activity 1.1.5 – Which Authentication Activity provided in Google Classroom. (50 pts)

Assigned: March 4th, 2026
Teacher Pacing Due Date: March 5th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.1.4 – Password Hashing

Objective:

Students will be able to:

  • Recognize authentication vocabulary terms.
  • Understand methods of secure password storage.
  • Define hashing as a method of one-way conversion.

Standards:

CSTA Compatibility Standards

  • 3A-NI-05 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  • 3B-NI-04 Compare ways software developers protect devices and information from unauthorized access.

Guiding Question:

How are passwords stored on a system and what is password hashing?

Resources:

  • Lesson Slides Lesson 1.1.4 – Password Hashing.pptx Presentation, Activity 1.1.4 – Hashing+Salts with CyberChef Activity and Activity 1.1.4 – Our Rainbow Table Google Sheet available on Google Classroom

Assignment:

  1. Read the Lesson 1.1.4 – Password Hashing.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete the Activity 1.1.4 – Hashing+Salts with CyberChef Activity using the Activity 1.1.4 – Our Rainbow Table Google Sheet provided in Google Classroom. (25 pts)

Assigned: March 3rd, 2026
Teacher Pacing Due Date: March 4th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.1.3 – Authentication and Password Attacks

Objective:

Students will be able to:

  • Define database as a collection of data organized for efficient organization and retrieval.
  • Explain 3 password guessing attack methods that use database information.

Standards:

CSTA Compatibility Standards

  • 3A-NI-05: Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

Guiding Question:

How can databases be used in password guessing attacks?

Resources:

  • Lesson Slides Lesson 1.1.3 – Authentication and Password Attacks.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 1.1.3 – Authentication and Password Attacks.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete the Activity 1.1.3 – Are You at Risk Student Worksheet Lab Activity using the materials provided in Google Classroom. (25 pts)

Assigned: March 2nd, 2026
Teacher Pacing Due Date: March 3rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.1.2 Authentication

Objective:

Students will be able to:

  • Identify primary methods of authentication.
  • Apply best practices for creating a safe password.

Standards:

CSTA Compatibility Standards

  • 3A-CS-02: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
  • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

Guiding Question:

How do authentication and strong passwords help secure data?

Resources:

  • Lesson Slides Lesson 1.1.2 – Authentication.pptx and Activity 1.1.2 – Creating a Safe Password.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 1.1.2 – Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Use the instructions in the Activity 1.1.2 – Creating a Safe Password.pptx presentation to complete the Activity 1.1.2 – Testing Password Strength document using the materials provided in Google Classroom. (25 pts)

Assigned: February 27th, 2026
Teacher Pacing Due Date: March 2nd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.1.1 – Intro to Security Concepts

Objective:

Students will be able to:

  • Identify the key goals and frameworks of Cybersecurity
  • Identify the CIA triad as the characteristics of information
  • Identify the state of information as stored, transmission, and processing

Standards:

CSTA Compatibility Standards

  • 3A-NI-08: Explain tradeoffs when selecting and implementing cybersecurity recommendations.

Guiding Question:

How does the protection of the CIA triad lead to the security of data?

Resources:

  • Lesson Slides 1.1.1 Intro to Security Concepts.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 1.1.1 – Intro to Security Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Use the instructions in the Lesson 1.1.1 – Intro to Security Concepts.pptx presentation to complete the Activity 1.1.1 – CIA Triad Scenarios Worksheet using the materials provided in Google Classroom. (25 pts)

Assigned: February 26th, 2026
Teacher Pacing Due Date: February 27th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 5.2.1 – Network Components

Objective:

Students will be able to:

  • Define differences between LAN and WAN
  • Identify characteristics of central connection devices

Standards:

CompTIA Security+ Objectives:
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
• Segmentation

4.1 Given a scenario, apply common security techniques to computing resources.
• Hardening Targets
• Switches, Routers, Servers

Guiding Question:

What is the difference between a WAN and a LAN and what are some basic network components?

Resources:

  • Lesson Slides Lesson 5.2.1 – Network Components.pptx and Student Handout 2.1.2 – IoT Devices.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson 5.2.1 – Network Components.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Use the instructions in the Lesson 5.2.1 – Network Components.pptx presentation to complete the Activity 5.2.1 – Network Puzzle Worksheet Check for Understanding activity using the materials provided in Google Classroom. (25 pts)

Assigned: February 9th, 2026
Teacher Pacing Due Date: February 10th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.8.1 – Basic Network Concepts

Objective:

Students will be able to:

  • Recognize how protocols, IP addresses, and ports are used to send and receive data on a network.
  • Identify the function of common networking devices and services.
  • Use built-in network tools to examine a device’s network configuration and connectivity.

Standards:

CompTIA Tech+ FC0-U71 Objective:

2.8 – Identify basic networking concepts.

  • Basics of Network Communication
  • Network identifiers
  • IP address
  • Media access control (MAC) address
  • Ports
  • Basic network services
  • Secure web browsing
  • File transfer
  • Email
  • Network devices
  • Modem
  • Router
  • Switch
  • Access point
  • Firewall
  • Networking models
  • Client/server
  • Peer-to-peer
  • Local area network (LAN)
  • Wide area network (WAN)

Guiding Question:

How do devices know where to send data on a network, and what makes that communication work?

Resources:

  • Lesson Slides 2.8.1 – Basic Network Concepts.pptx and Lab Slides 2.8.1 – Know Your Network.pptx presentations and Student Handout 2.8.1 – Basic Network Concepts available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.8.1 – Basic Network Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete first half of the Student Handout 2.8.1 – Basic Network Concepts Check for Understanding activity using the materials provided in Google Classroom. (25 pts)
  3. Use the information in the Lab Slides 2.8.1 – Know Your Network.pptx presentation to complete the second half of the Student Handout 2.8.1 – Basic Network Concepts document by end of day on Tuesday, February 17th. (25 pts)

Assigned: February 12th, 2026
Teacher Pacing Due Date: February 17th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.1.2 – IoT Devices

Objective:

Students will be able to:

  • Identify IoT devices and how they communicate.
  • Explain how IoT devices impact daily life.
  • Describe the functions and key features of common IoT devices.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.1 – Explain common computing devices and their purposes.

  • Internet of Things (IoT)
    • Home appliances
    • Home automation devices
      • Thermostats
      • Security systems
      • Home assistants
      • Deadbolts/door locks
      • Video doorbells
    • Vehicles
    • Internet Protocol (IP)/security cameras
    • Streaming media devices
    • Medical devices
    • Exercise equipment
    • Wearable devices

Guiding Question:

What are IoT devices, how do they communicate, and how do they provide convenience in daily life?

Resources:

  • Lesson Slides 2.1.2 – IoT Devices.pptx and Student Handout 2.1.2 – IoT Devices.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.1.2 – IoT Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Use the instructions in the Lesson Slides 2.1.2 – IoT Devices.pptx presentation to complete the Student Handout 2.1.2 – IoT Devices Check for Understanding activity using the materials provided in Google Classroom. (25 pts)

Assigned: February 9th, 2026
Teacher Pacing Due Date: February 10th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.1.1 – Different Computing Devices

Objective:

Students will be able to:

  • Explain the purpose of different computing devices.
  • Identify the key features and common uses of different computing devices.
  • Evaluate a scenario and determine which computing device would meet a user’s needs.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.1 – Explain common computing devices and their purposes.

  • Smartphones
  • Tablets
  • E-readers
  • Laptops
  • Workstations
  • Servers
  • Gaming consoles
  • Virtual reality systems
  • Augmented reality systems

Guiding Question:

What are the common types of computing devices and what are their purposes?

Resources:

  • Lesson Slides 2.1.1 – Different Computing Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
  3. Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx presentation to complete the Student Handout 2.1.1 – Different Computing Devices Check for Understanding activity using the materials provided in Google Classroom. (25 pts)

Assigned: February 5th, 2026
Teacher Pacing Due Date: February 6th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.2 – Network Storage Devices

Objective:

Students will be able to:

  • Identify network storage and its purpose.
  • Describe common types of network storage.
  • Distinguish between network storage and storage drives.

Standards:

CompTIA Tech+ FC0-U71 Objective:
2.3 Compare and compare storage types.

  • Volatile vs. non-volatile
  • Local storage
    • RAM
    • Read-only memory (ROM)
    • Storage drive
      • Magnetic disks/hard disk drive (HDD)
      • Solid-state drive (SSD)
      • Non-volatile memory express (NVMe)
    • Optical
    • External flash drives
  • Local network storage
    • Network-attached storage (NAS)
    • File server
    • Cloud storage service

Guiding Question:

What is network storage, its purpose, and how is it different than storage drives?

Resources:

  • Lesson Slides 2.3.2 – Network Storage Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom

Assignment:

  1. Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
  3. Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx and the  Lab Slides 2.3.2 – Network File Access with SSH.pptx presentation to complete the Student Handout 2.3.2 – Network Storage Devices Check for Understanding activity using the materials provided in Google Classroom. (50 pts)

Assigned: February 3rd, 2026
Teacher Pacing Due Date: February 4th, 2026