3A-NI-05 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04 Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How are passwords stored on a system and what is password hashing?
Resources:
Lesson Slides Lesson 1.1.4 – Password Hashing.pptx Presentation, Activity 1.1.4 – Hashing+Salts with CyberChef Activity and Activity 1.1.4 – Our Rainbow Table Google Sheet available on Google Classroom
Assignment:
Read the Lesson 1.1.4 – Password Hashing.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.4 – Hashing+Salts with CyberChef Activity using the Activity 1.1.4 – Our Rainbow Table Google Sheet provided in Google Classroom. (25 pts)
Assigned: March 3rd, 2026 Teacher Pacing Due Date: March 4th, 2026
Define database as a collection of data organized for efficient organization and retrieval.
Explain 3 password guessing attack methods that use database information.
Standards:
CSTA Compatibility Standards
3A-NI-05: Give examples to illustrate how sensitive data can be affected by malware and other attacks.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How can databases be used in password guessing attacks?
Resources:
Lesson Slides Lesson 1.1.3 – Authentication and Password Attacks.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.3 – Authentication and Password Attacks.pptx Microsoft PowerPoint slideshow in today’s class.
Complete theActivity 1.1.3 – Are You at Risk Student Worksheet Lab Activity using the materials provided in Google Classroom. (25 pts)
Assigned: March 2nd, 2026 Teacher Pacing Due Date: March 3rd, 2026
Apply best practices for creating a safe password.
Standards:
CSTA Compatibility Standards
3A-CS-02: Compare levels of abstraction and interactions between application software, system software, and hardware layers.
3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
How do authentication and strong passwords help secure data?
Resources:
Lesson Slides Lesson 1.1.2 – Authentication.pptx and Activity 1.1.2 – Creating a Safe Password.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.2 – Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Activity 1.1.2 – Creating a Safe Password.pptx presentation to complete theActivity 1.1.2 – Testing Password Strength document using the materials provided in Google Classroom. (25 pts)
Assigned: February 27th, 2026 Teacher Pacing Due Date: March 2nd, 2026
Identify the key goals and frameworks of Cybersecurity
Identify the CIA triad as the characteristics of information
Identify the state of information as stored, transmission, and processing
Standards:
CSTA Compatibility Standards
3A-NI-08: Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Guiding Question:
How does the protection of the CIA triad lead to the security of data?
Resources:
Lesson Slides 1.1.1 Intro to Security Concepts.pptx and Lab 5.2.2 – ARP with Wireshark.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 1.1.1 – Intro to Security Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 1.1.1 – Intro to Security Concepts.pptx presentation to complete theActivity 1.1.1 – CIA Triad Scenarios Worksheet using the materials provided in Google Classroom. (25 pts)
Assigned: February 26th, 2026 Teacher Pacing Due Date: February 27th, 2026
Identify characteristics of central connection devices
Standards:
CompTIA Security+ Objectives: 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. • Segmentation
4.1 Given a scenario, apply common security techniques to computing resources. • Hardening Targets • Switches, Routers, Servers
Guiding Question:
What is the difference between a WAN and a LAN and what are some basic network components?
Resources:
Lesson Slides Lesson 5.2.1 – Network Components.pptx and Student Handout 2.1.2 – IoT Devices.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson 5.2.1 – Network Components.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson 5.2.1 – Network Components.pptx presentation to complete theActivity 5.2.1 – Network Puzzle WorksheetCheck for Understanding activity using the materials provided in Google Classroom. (25 pts)
Assigned: February 9th, 2026 Teacher Pacing Due Date: February 10th, 2026
Recognize how protocols, IP addresses, and ports are used to send and receive data on a network.
Identify the function of common networking devices and services.
Use built-in network tools to examine a device’s network configuration and connectivity.
Standards:
CompTIA Tech+ FC0-U71 Objective:
2.8 – Identify basic networking concepts.
Basics of Network Communication
Network identifiers
IP address
Media access control (MAC) address
Ports
Basic network services
Secure web browsing
File transfer
Email
Network devices
Modem
Router
Switch
Access point
Firewall
Networking models
Client/server
Peer-to-peer
Local area network (LAN)
Wide area network (WAN)
Guiding Question:
How do devices know where to send data on a network, and what makes that communication work?
Resources:
Lesson Slides 2.8.1 – Basic Network Concepts.pptx and Lab Slides 2.8.1 – Know Your Network.pptx presentations and Student Handout 2.8.1 – Basic Network Concepts available on Google Classroom
Assignment:
Read the Lesson Slides 2.8.1 – Basic Network Concepts.pptx Microsoft PowerPoint slideshow in today’s class.
Complete first half of theStudent Handout 2.8.1 – Basic Network ConceptsCheck for Understanding activity using the materials provided in Google Classroom. (25 pts)
Use the information in the Lab Slides 2.8.1 – Know Your Network.pptx presentation to complete the second half of the Student Handout 2.8.1 – Basic Network Concepts document by end of day on Tuesday, February 17th. (25 pts)
Assigned: February 12th, 2026 Teacher Pacing Due Date: February 17th, 2026
Describe the functions and key features of common IoT devices.
Standards:
CompTIA Tech+ FC0-U71 Objective: 2.1 – Explain common computing devices and their purposes.
Internet of Things (IoT)
Home appliances
Home automation devices
Thermostats
Security systems
Home assistants
Deadbolts/door locks
Video doorbells
Vehicles
Internet Protocol (IP)/security cameras
Streaming media devices
Medical devices
Exercise equipment
Wearable devices
Guiding Question:
What are IoT devices, how do they communicate, and how do they provide convenience in daily life?
Resources:
Lesson Slides 2.1.2 – IoT Devices.pptx and Student Handout 2.1.2 – IoT Devices.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson Slides 2.1.2 – IoT Devices.pptx Microsoft PowerPoint slideshow in today’s class.
Use the instructions in the Lesson Slides 2.1.2 – IoT Devices.pptx presentation to complete theStudent Handout 2.1.2 – IoT DevicesCheck for Understanding activity using the materials provided in Google Classroom. (25 pts)
Assigned: February 9th, 2026 Teacher Pacing Due Date: February 10th, 2026
Explain the purpose of different computing devices.
Identify the key features and common uses of different computing devices.
Evaluate a scenario and determine which computing device would meet a user’s needs.
Standards:
CompTIA Tech+ FC0-U71 Objective: 2.1 – Explain common computing devices and their purposes.
Smartphones
Tablets
E-readers
Laptops
Workstations
Servers
Gaming consoles
Virtual reality systems
Augmented reality systems
Guiding Question:
What are the common types of computing devices and what are their purposes?
Resources:
Lesson Slides 2.1.1 – Different Computing Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx presentation to complete the Student Handout 2.1.1 – Different Computing Devices Check for Understanding activity using the materials provided in Google Classroom. (25 pts)
Assigned: February 5th, 2026 Teacher Pacing Due Date: February 6th, 2026
Distinguish between network storage and storage drives.
Standards:
CompTIA Tech+ FC0-U71 Objective: 2.3 Compare and compare storage types.
Volatile vs. non-volatile
Local storage
RAM
Read-only memory (ROM)
Storage drive
Magnetic disks/hard disk drive (HDD)
Solid-state drive (SSD)
Non-volatile memory express (NVMe)
Optical
External flash drives
Local network storage
Network-attached storage (NAS)
File server
Cloud storage service
Guiding Question:
What is network storage, its purpose, and how is it different than storage drives?
Resources:
Lesson Slides 2.3.2 – Network Storage Devices.pptx and Lab Slides 2.3.2 – Network File Access with SSH.pptx Presentations available on Google Classroom
Assignment:
Read the Lesson Slides 2.3.2 – Network Storage Devices.pptx Microsoft PowerPoint slideshow in today’s class.
Work through the Lab Slides 2.3.2 – Network File Access with SSH.pptx Lab Activity in class using the materials provided in Google Classroom.
Use the instructions in theLesson Slides 2.3.2 – Network Storage Devices.pptx and the Lab Slides 2.3.2 – Network File Access with SSH.pptxpresentation to complete the Student Handout 2.3.2 – Network Storage Devices Check for Understanding activity using the materials provided in Google Classroom. (50 pts)
Assigned: February 3rd, 2026 Teacher Pacing Due Date: February 4th, 2026