Students will compare and contrast various types of threat vectors.
Standards:
CompTIA Security+ SYO-701 Objective:
2.2 – Explain common threat vectors and attack surfaces
Message-based
Email
Short Message Service (SMS)
Instant Messaging (IM)
Image-based
File-based
Voice call
Removable device
Vulnerable software
Client-based vs agentless
Unsupported systems and applications
Unsecure networks
Wireless
Wired
Bluetooth
Open service ports
Default credentials
Supply chain
Managed service providers (MSPs)
Vendors
Supplies
Guiding Question:
What are some different attack surfaces and threat vectors?
Resources:
Lesson 2.2.1 – Common Attack Surfaces.pptx Presentation and 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
Read through the Lesson 2.2.1 – Common Attack Surfaces.pptx presentation in today’s class.
Complete the 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: November 6th, 2025 Teacher Pacing Due Date: November 7th, 2025
Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective: 2.4 – Given a scenario, analyze indicators of malicious activity
Malware attacks
Keylogger
Guiding Question:
What are keyloggers and how can students defend against this attack?
Resources:
Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.4.5 – Keyloggers.pptx presentation in today’s class.
Complete the Lab – Intro to Keyloggers.pptx Activity in class using the materials provided in Google Classroom.
To confirm completion the lab activity, upload a screenshot (with today’s date) of the captured keystrokes on the Kali system from the active keylogger session in the Windows environment to today’s Google Classroom post.
Assigned: November 4th, 2025 Teacher Pacing Due Date: November 5th, 2025
Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective: 2.4 – Given a scenario, analyze indicators of malicious activity
Malware attacks
Trojan
Guiding Question:
What are trojans, backdoors, and RATs and how can students defend themselves against these attacks?
Resources:
Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom
Assignment:
Read the Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx presentation in today’s class.
Complete the Lab – Trojan.pptx Activity in class using the materials provided in Google Classroom.
Pair off in groups of two: One should play the Attacker, the other should play the Victim. Submit two screenshots: One of your Kali Linux Terminal window running the Meterpreter session (Attacker), and one of the Vulnerable Windows 7 with a “malicious_folder” created on the Desktop (Victim)!
If you choose to fly solo on this one, you will need to submit both screenshots yourself!
Assigned: October 30th, 2025 Teacher Pacing Due Date: October 31st, 2025
Students will analyze common methods to manage vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management
Analysis
Confirmation
False positive
False negative
Prioritize
Common Vulnerability Scoring System (CVSS)
Common Vulnerability Enumeration (CVE)
Vulnerability classification
Exposure factor
Environmental variables
Industry/organizational impact
Risk tolerance
Vulnerability response and remediation
Patching
Insurance
Segmentation
Compensating controls
Exceptions and exemptions
Validation of remediation
Rescanning
Audit
Verification
Reporting
Guiding Question:
What are some common methods to identify vulnerabilities?
Resources:
Lesson 4.3.2 – Vulnerability Management.pptx Presentation and 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
Read through the 4.3.2 – Vulnerability Management.pptx presentation in today’s class.
Complete the 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: October 27th, 2025 Teacher Pacing Due Date: October 28th, 2025
Read through the 2.2 Protecting Spaces Slide Deck.pptx presentation in today’s class.
Divide into groups of 2 – 3. There are five stations located around the classroom, each with a physical facility that you will be tasked with securing. Choose one of the five stations to start with.
Work as a team to complete the 2.2 Scenarios Student Lab Guidedocument available in the Google Classroom to for the physical facility represented by your station. You will be given time to answer the questions in the Lab Guide for your given scenario, then we will rotate to the next station.
Follow the instructions in the Lab Guide to complete the Risk Matrix and design resource-efficient security plans to balance the various priorities in each scenario. We will discuss your results in class.
Assigned: October 22nd, 2025 Teacher Pacing Due Date: October 23rd, 2025