Tag Archives: Term 1

CYBER.ORG: AP Cybersecurity – Topic 2.2.2 – OSINT

Objective:

  • Students will investigate open source-online tools (OSINT) used to perform reconnaissance.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 6-8.DC.FOOT.1 -Recognize the many sources of data that make up a digital footprint
  • CSTA Compatibility Standards
    • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Guiding Question:

How and why is open-source intelligence used legally to gather free, public information?

Resources:

Assignment:

  1. Follow along with the 2.2.2 – OSINT.pptx presentation in today’s class.
  2. Complete the OSINT Report on Tony Stark Activity in class using the materials provided in Google Classroom.

Assigned: August 28th, 2025
Teacher Pacing Due Date: August 29th, 2025

CYBER.ORG: AP Cybersecurity – Topic 2.1.1 – Social Engineering

Objective:

  • Define the steps used in typical digital attacks.
  • Define social engineering as the human risk in organization security.
  • Identify techniques for social engineering and how to mitigate against these techniques.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
  • CSTA Compatibility Standards
    • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Guiding Question:

How can we protect against social engineering?

Resources:

Assignment:

  1. Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
  2. Complete the Seven Steps of Hacking Activity in class using the materials provided.

Assigned: August 27th, 2025
Teacher Pacing Due Date: August 27th, 2025

CYBER.ORG: AP Cybersecurity – Topic 1.1.A – Threat Actors & Case Study – Stuxnet

Objective:

The student will analyze threat actors and their motivations.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 2.1 – Compare and contrast common threat actors and motivations

Guiding Question:

What are threat actors and their motivations?

Resources:

Assignment:

  1. Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
  2. Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
  3. Please do your best to complete the Case Study by end of day on Tuesday, August 26th.

Assigned: August 25th, 2025
Teacher Pacing Due Date: August 26th, 2025

CYBER.ORG: AP Cybersecurity – Topic 1.1: Understanding Adversaries – Intro to Social Engineering

Objective:

  • Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
  • Define social engineering and describe how attackers use it to exploit human behavior.
  • Explain what phishing is and how it could be used in a gaming scenario.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
    • 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.

Guiding Question:

How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?

Resources:

Assignment:

  1. Follow along with the Lesson 1.1.B presentation in today’s class.
  2. Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
  3. Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.

Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025

AP CYBERSECURITY PRE-TEST – FALL 2025

Objective: Demonstrate prior knowledge in Cybersecurity Principles through completion of a pre-test assessment.

Resources:

Assignment:

Assigned: August 15th, 2025
Teacher Pacing Due Date: August 15th, 2025

CYBER.ORG – WELCOME TO THE CYBER RANGE – FALL 2025

Objective:

Students will begin preparing for proficiency in cyber security by connecting to the CYBER.ORG Cyber Range.

Link:

Assignment:

  1. Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
  2. A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
  3. Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
  4. Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
  5. We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface on Monday.

Posted: August 14th, 2025

INTRODUCTION TO THE AP CYBERSECURITY CURRICULUM – FALL 2025

Objective: 

I can access the online course materials by logging into the TestOut website so I can complete the class assignments and simulation labs.

Links:

AP Cybersecurity at the College Board Website:
https://myap.collegeboard.org

Topics Discussed:

  • College Board
  • AP Cybersecurity
  • Career Kickstart Program
  • AP Curriculum
  • AP Cybersecurity Exam

Assignment:

  1. Visit our Google Classroom to receive the link to the College Board’s AP Cybersecurity learning platform.
  2. Follow along with the in-class instructions.

Posted: August 13th, 2025

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2025

Objective:

I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Chrome and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 12th, 2025
Teacher Pacing Due Date: August 12th, 2025

INTRO TO AP CYBERSECURITY – MACINTOSH ACCOUNT SETUP 2025-26

Objectives:

  • I can successfully log on to the 225 lab iMac workstations.

Links:

Lab Use Policy Presentation

Topics Discussed:

  • Proper use of school and network resources
  • Software Copying
  • Copyright
  • Software Privacy and Vandalism
  • Care of Equipment
  • Food and Drink Policy
  • Internet Usage Guidelines
  • Consequences of Policy Violation

Assignment:

  1. Today I’ll walk you through the process of logging in to the computer for the first time.
  2. Don’t forget your signed Technology Agreements are due today! Make sure you get those turned in to me before you leave class.
  3. Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you give me your signed Technology Agreement and get logged in today so you’re ready for this week’s lessons.

Posted: August 11th, 2025

INTRO TO AP CYBERSECURITY – FALL 2025 – PHYSICAL SECURITY: “PROTECT THE CROWN JEWELS!”

Objective:

  • I can complete a physical security-related icebreaker activity to help build a fun and collaborative working environment.

Links:
None.

Topics Discussed:

  • Cybersecurity
  • Physical Security

Assignment:

Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Today we’re going to complete a Physical Security thought exercise.
  2. The scenario is this: In the kingdom of Far, Far Away, you are the Security Chief of the Royal Museum, appointed by the Queen herself to guard her most precious possession: Her Majesty’s Royal Crown – a priceless artifact made of the most precious metals, jewels and fabrics, and a symbol of the wealth, power and dignity of the royal family.
  3. However, as a monarch of the People, the Queen wants to ensure that everyone can view and enjoy the magnificence of the Royal Crown.
  4. Of course, there are those who would love to make the Crown their own, and would go through great lengths to steal it. As such, she has tasked you with designing a building, outfitted with the latest in security measures, to prevent this from happening.
  5. Grab a partner, and put your heads together to design the most secure facility imaginable, and help Her Majesty protect the Crown! Remember: You have to let people in, but you only have to let them see – not touch- the Crown! Think about all the ways someone might try to steal the Crown, and how you might stop them!
  6. Use the provided paper, pencils, pens and markers to sketch out your super secure Crown viewing facility, and be prepared to present and explain your security configuration to the class, and at the end, we’ll vote on the most secure facility!
  7. Good Luck! The Queen’s most precious possession and the dignity of the Royal Family is in your hands!

Posted: August 8th, 2025