Tag Archives: Term 2

CYBER.ORG: AP Cybersecurity – Lesson 2.4.8 – DoS and DDoS

Objective:

  • Students will analyze potential indicators associated with network attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Network Attacks
    • Distributed denial-of-service (DDoS)
      • Amplified
      • Reflected

Guiding Question:

What are 3 types of DDoS attacks and how can you defend against them?

Resources:

Assignment:

  1. Read the 2.4.8 – DoS and DDoS.pptx presentation in today’s class.
  2. Complete the Case Study – Botnet Activity in class using the materials provided in Google Classroom.
  3. We will conduct a DoS Lab Activity when we return from the Veterans Day recess on Wednesday!

Assigned: November 10th, 2025
Teacher Pacing Due Date: November 12th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.2.1 – Common Attack Surfaces

Objective:

  • Students will compare and contrast various types of threat vectors.

Standards:

CompTIA Security+ SYO-701 Objective:

2.2 – Explain common threat vectors and attack surfaces

  • Message-based
    • Email
    • Short Message Service (SMS)
    • Instant Messaging (IM)
  • Image-based
  • File-based
  • Voice call
  • Removable device
  • Vulnerable software
    • Client-based vs agentless
  • Unsupported systems and applications
  • Unsecure networks
    • Wireless
    • Wired
    • Bluetooth
  • Open service ports
  • Default credentials
  • Supply chain
    • Managed service providers (MSPs)
    • Vendors
    • Supplies

Guiding Question:

  • What are some different attack surfaces and threat vectors?

Resources:

Lesson 2.2.1 – Common Attack Surfaces.pptx Presentation and 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the Lesson 2.2.1 – Common Attack Surfaces.pptx presentation in today’s class.
  2. Complete the 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: November 6th, 2025
Teacher Pacing Due Date: November 7th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.6 – Logic Bomb & Rootkits

Objective:

  • Students will analyze potential indicators to determine the type of attack including logic bombs and rootkits.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks
    • Logic Bomb
    • Rootkit

Guiding Question:

What are logic bombs and rootkits and how can enterprises defend themselves against them?

Resources:

  • Lesson 2.4.6 – Logic Bomb & Rootkit.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.6 – Logic Bomb & Rootkit.pptx presentation in today’s class.
  2. Complete the Case Study – Logic Bomb Activity in class using the materials provided in Google Classroom.

Assigned: November 5th, 2025
Teacher Pacing Due Date: November 6th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.5 – Keyloggers

Objective:

  • Students will analyze potential indicators to determine the type of attack.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks
    • Keylogger

Guiding Question:

What are keyloggers and how can students defend against this attack?

Resources:

  • Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.5 – Keyloggers.pptx presentation in today’s class.
  2. Complete the Lab – Intro to Keyloggers.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the captured keystrokes on the Kali system from the active keylogger session in the Windows environment to today’s Google Classroom post.

Assigned: November 4th, 2025
Teacher Pacing Due Date: November 5th, 2025

CYBER.ORG: AP Cybersecurity – 2.4.4 – Viruses, Worms, Spyware & Adware

Objective:

  • Students will potential indicators to determine attack types that include viruses, worms, spyware, bloatware and adware.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks
    • Worm
    • Virus
    • Spyware
    • Bloatware

Guiding Question:

What are viruses, worms, spyware, bloatware and adware and how can enterprises defend themselves against these attacks?

Resources:

  • Lesson 2.4.4 – Viruses, Worms, Spyware & Adware.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.4 – Viruses, Worms, Spyware & Adware.pptx presentation in today’s class.
  2. Complete the 2.4.4 – Viruses, Worms, Spyware & Adware – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: November 3rd, 2025
Teacher Pacing Due Date: November 4th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.3 – Trojans, Backdoors, and RATs

Objective:

  • Students will analyze potential indicators to determine the type of attack.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks
    • Trojan

Guiding Question:

 What are trojans, backdoors, and RATs and how can students defend themselves against these attacks?

Resources:

  • Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx presentation in today’s class.
  2. Complete the Lab – Trojan.pptx Activity in class using the materials provided in Google Classroom.
  3. Pair off in groups of two: One should play the Attacker, the other should play the Victim. Submit two screenshots: One of your Kali Linux Terminal window running the Meterpreter session (Attacker), and one of the Vulnerable Windows 7 with a “malicious_folder” created on the Desktop (Victim)!
    • If you choose to fly solo on this one, you will need to submit both screenshots yourself!

Assigned: October 30th, 2025
Teacher Pacing Due Date: October 31st, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.2 – Ransomware

Objective:

  • Students will analyze potential indicators to determine the type of attack.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks
    • Ransomware

Guiding Question:

 What is ransomware and cryptomalware and how can students defend themselves against these attacks?

Resources:

Assignment:

  1. Read the Lesson 2.4.2 – Ransomware.pptx presentation in today’s class.
  2. Complete the Lab – Ransomware.pptx Activity in class using the materials provided in Google Classroom.
  3. Submit a screenshot of your Cyber Range Windows 7 locked up with the red WannaCry ransomware message to receive credit for completion of this lab!

Assigned: October 29th, 2025
Teacher Pacing Due Date: October 30th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.1 – Malware

Objective:

  • Students will analyze potential indicators to determine the type of attack.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Malware attacks

Guiding Question:

What are some common malware types?

Resources:

Assignment:

  1. Read the Lesson 2.4.1 – Malware.pptx presentation in today’s class.
  2. Complete the Case Study – Malware Activity in class using the materials provided in Google Classroom.

Assigned: October 28th, 2025
Teacher Pacing Due Date: October 29th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.3.2 – Vulnerability Management

Objective:

  • Students will analyze common methods to manage vulnerabilities.

Standards:

CompTIA Security+ SYO-701 Objective:

4.3 – Explain various activities associated with vulnerability management

  • Analysis
    • Confirmation
      • False positive
      • False negative
      • Prioritize
      • Common Vulnerability Scoring System (CVSS)
      • Common Vulnerability Enumeration (CVE)
      • Vulnerability classification
      • Exposure factor
      • Environmental variables
      • Industry/organizational impact
      • Risk tolerance
  • Vulnerability response and remediation
    • Patching
    • Insurance
    • Segmentation
    • Compensating controls
    • Exceptions and exemptions
  • Validation of remediation
    • Rescanning
    • Audit
    • Verification
  • Reporting

Guiding Question:

  • What are some common methods to identify vulnerabilities?

Resources:

Lesson 4.3.2 – Vulnerability Management.pptx Presentation and 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the 4.3.2 – Vulnerability Management.pptx presentation in today’s class.
  2. Complete the 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: October 27th, 2025
Teacher Pacing Due Date: October 28th, 2025

APCK Cyber: AP Cybersecurity – Topic 2.2 – Protecting Spaces

Objectives:

  • Students will be able to work in teams as an IT department to design cost-effective security plans for various organizational scenarios.

Standards:

  • Students will be able to use a risk matrix to prioritize physical vulnerabilities in a given scenario.
  • Students will be able to design a cost-effective security plan that combines managerial and physical controls.

Guiding Question:

Why is Physical Security important to Cybersecurity?

Resources:

  • Video Reviewing Risk Matrix:
    https://www.youtube.com/watch?v=-E-jfcoR2W0
  • 2.2 Protecting Spaces Slide Deck.pptx available on Google Classroom
  • 2.2 Scenarios Student Lab Guide available on Google Classroom

Assignment:

  1. Read through the 2.2 Protecting Spaces Slide Deck.pptx presentation in today’s class.
  2. Divide into groups of 2 – 3. There are five stations located around the classroom, each with a physical facility that you will be tasked with securing. Choose one of the five stations to start with.
  3. Work as a team to complete the 2.2 Scenarios Student Lab Guide document available in the Google Classroom to for the physical facility represented by your station. You will be given time to answer the questions in the Lab Guide for your given scenario, then we will rotate to the next station.
  4. Follow the instructions in the Lab Guide to complete the Risk Matrix and design resource-efficient security plans to balance the various priorities in each scenario. We will discuss your results in class.

Assigned: October 22nd, 2025
Teacher Pacing Due Date: October 23rd, 2025