Tag Archives: Term 4

AP Cybersecurity Final Reflection – Spring 2026

Objective:

  • I can reflect on my involvement and engagement with the lessons I have learned during the 1st Quarter of Fall 2023 by answering a series of reflective questions so that I can identify my areas of strength and opportunities for growth.

Links:
https://classroom.google.com

Topics Discussed:

  • Reflection

Assignment:

  1. Connect to the Google Classroom site and click on the link to the Google Form at the bottom of the latest post.
  2. Think back from the beginning of the school year to now, and answer the questions provided to reflect on your successes and struggles throughout the first quarter.
  3. You must have at least two complete sentences for each question in each prompt, but use as many sentences as you need to complete your short answer.
  4. Click the Submit button at the bottom of the page to submit your final responses. Do not click any other buttons or navigate away from the page before submitting your answers, or they may be erased. You may even wish to type your answers in a Google Doc or Word Document and then transfer them to the form.
  5. Once you have submitted your form, return to the Google Classroom assignment post, and click the Mark as Done button to mark this assignment as completed and ready for grading.
  6. Your response will be graded on the following criteria: meeting minimum length requirements, clarity, original ideas and mechanics (spelling, grammar and punctuation).
  7. You should consider this a professional post-mortem of a long-form academic experience, and conduct yourself accordingly.
  8. Good luck, and thanks for all your hard work this year! Enjoy your Summer, and consider taking my AP Networking class next year during 4th or 7th period for a chance to earn additional AP credit and a CompTIA Network+ certification!

Assigned: May 19th, 2026
Teacher Pacing Due Date: May 19th, 2026

AP Cybersecurity Exam Post-Mortem – Spring 2026

Objective: 

I can reflect on yesterday’s AP Cybersecurity exam in preparation for my upcoming attempt at the CompTIA Security+ Exam.

Links:

Bluebook Digital Testing platform: https://bluebook.collegeboard.org/
TestOut IT Certification Training:  https://labsimapp.testout.com/

Topics Discussed:

  • AP Cybersecurity
  • AP Exam
  • CompTIA Security+ Exam

Assignment:

  1. Complete the AP Cybersecurity Post-Mortem Activity posted in our Google Classroom

Posted: May 8th, 2026
Due Date: May 10th 2026

Introduction to the College Board Bluebook Testing Platform and the TestOut Online Learning Platform – Spring 2026

Objective: 

I can access the online testing platform and test prep platform by logging into the College Board Bluebook website and the CompTIA TestOut website so I can prepare for and take the AP Cybersecurity exam.

Links:

Bluebook Digital Testing platform: https://bluebook.collegeboard.org/
TestOut IT Certification Training:  https://labsimapp.testout.com/

Topics Discussed:

  • Bluebook Digital Testing platform
  • TestOut LabSim online courseware
  • Online Coursework
  • AP Cybersecurity

Resources:

Collegeboard.org: How Are AP Exams Administered?
Collegeboard.org: What to Bring on AP Exam Day

Assignment:

  1. Visit our Google Classroom to receive the invitation link to the TestOut online learning platform.
  2. Follow along with the in-class instructions.

Posted: April 27th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 3.3.2 – Data Sovereignty and Protection

Objective:

  • Students will analyze common methods to secure data.

Standards:

CompTIA Security+ Objective(s)

  • 3.3 – Compare and contrast concepts and strategies to protect data
    • General data considerations
    • Data states
      • Data at rest
      • Data in transit
      • Data in use
    • Data sovereignty
    • Geolocation
  • Methods to secure data
    • Geographic restrictions
    • Encryption
    • Hashing
    • Masking
    • Tokenization
    • Obfuscation
    • Segmentation
    • Permission restrictions

Guiding Question:

What are common methods to secure data?

Resources:

  • Lesson 3.3.2 – Data Sovereignty and Protection.pptx and Lesson 3.3.2 Data Sovereignty and Protection Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 3.3.2 – Data Sovereignty and Protection.pptx presentation in today’s class.
  2. Complete and hand in the Lesson 3.3.2 Data Sovereignty and Protection Activity Form posted in the Google Classroom (25 pts).

Assigned: April 23rd, 2026
Teacher Pacing Due Date: April 24th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 5.3.1 – SIEM Tools

Objective:

  • Students will:
    • Understand the purpose and role of SIEM systems in cybersecurity.
    • Identify key components and architecture of a SIEM system.
    • Examine the benefits and challenges of implementing a SIEM solution.
    • Explore how SIEM systems are applied in real-world scenarios. identify appropriate uses for IDS, IPS, and EDR.

Standards:

CompTIA Security+ Objective(s)

  • 4.4: Explain security alerting and monitoring concepts and tools.
    • Tools

Guiding Question:

 What is a SIEM, and how does it improve cybersecurity operations?

Resources:

  • Lesson 5.3.1 – SIEM Tools.pptx and Lab 5.3.1 – GoAccess.pptx presentations and Lab 5.3.1 – GoAccess Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 5.3.1 – SIEM Tools.pptx presentation in today’s class.
  2. Complete the Lab 5.3.1 – GoAccess Activity Form using the Lab 5.3.1 – GoAccess.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 5.3.1 – GoAccess Activity Form to complete the lab (50 pts).

Assigned: April 22nd, 2026
Teacher Pacing Due Date: April 23rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 5.2.1 – IDS, IPS, and EDR

Objective:

  • Students will:
    • Define IDS, IPS, and EDR and describe their roles in cybersecurity.
    • Differentiate between IDS and IPS.
    • Explain how IDS, IPS, and EDR work together for layered security.
    • Analyze scenarios to identify appropriate uses for IDS, IPS, and EDR.

Standards:

CompTIA Pentest+ Objective(s):

  • 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
    • Infrastructure considerations
    • Intrusion prevention system (IPS)/intrusion detection system (IDS)

Guiding Question:

 How do IDS, IPS, and EDR contribute to a secure network?

Resources:

  • Lesson 5.2.1 – IDS, IPS, and EDR.pptx and 5.2.1 – IDS, IPS, and EDR Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 5.2.1 – IDS, IPS, and EDR.pptx presentation in today’s class.
  2. Complete and hand in the completed 5.2.1 – IDS, IPS, and EDR Activity Form to complete the check for understanding activity (25 pts).

Assigned: April 21st, 2026
Teacher Pacing Due Date: April 22nd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.6.1 – Cryptographic Flaws and Attacks

Objective:

  • Students will:
    • Identify common cryptographic flaws and vulnerabilities in various systems.
    • Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
    • Analyze case studies of real-world cryptographic breaches to understand their impact.
    • Evaluate the effectiveness of different cryptographic algorithms and protocols.
    • Recommend best practices for securing cryptographic implementations in applications.

Standards:


CompTIA Security+ Objective(s):

3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.

  • 2.4 Given a scenario, analyze indicators of malicious activity.
    • Downgrade
    • Collision
    • Birthday

Guiding Question:

How does cryptography and encryption protect our daily digital interactions and ensure the security of information?

Resources:

  • Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
  2. Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).

Assigned: April 20th, 2026
Teacher Pacing Due Date: April 21st, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.5.1 – Daily Application of Cryptography and Encryption

Objective:

  • Students will:
    • Understand the basic concepts of cryptography and encryption.
    • Identify common uses of encryption in daily life.
    • Explain the importance of encryption in securing information.
    • Analyze case studies of encryption in action.
    • Demonstrate the use of basic encryption tools or methods.

Standards:

CSTA Standard:
3B-NI-04 – Compare ways software developers protect devices and information fromunauthorized access.

Guiding Question:

How does cryptography and encryption protect our daily digital interactions and ensure the security of information?

Resources:

  • Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx and Lab 2.5.1 – Caesar and GPG.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
  2. Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 2.5.1 – Caesar and GPG Activity Form to complete the lab (50 pts).

Assigned: April 16th, 2026
Teacher Pacing Due Date: April 17th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Hashing Past and Present

Objective:

  • Students will:
    • Be able to explain the fundamental concepts of hashing and its historical development in computer science.
    • Identify and compare various hash functions, including MD5, SHA-1, SHA-2, and SHA-3, along with their applications and vulnerabilities.
    • Discuss the role of hashing in data integrity, security, and modern technologies such as blockchain.
    • Evaluate the implications of current challenges in hashing and consider future trends in cryptography, especially in the context of quantum computing.

Standards:

CompTIA Security+ SYO-701 Objective:

1.4 – Explain the importance of using appropriate cryptographic solutions

  • Hashing
  • Salting

    Guiding Question:

    What are the different types of encryption?

    Resources:

    • Lesson 2.3.1 – Hashing Past and Present.pptx and Lab 2.3.1 – Hashing.pptx presentations and Lab 2.3.1 – Hashing Activity sheet available on Google Classroom

    Assignment:

    1. Read the Lesson 2.3.1 – Hashing Past and Present.pptx presentation in today’s class.
    2. Complete the Lab 2.3.1 – Hashing Activity Form using the Lab 2.3.1 – Hashing.pptx Powerpoint Presentation posted in the Google Classroom.
    3. Hand in the completed Lab 2.3.1 – Hashing Activity Form to complete the lab (50 pts).

    Assigned: April 15th, 2026
    Teacher Pacing Due Date: April 16th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 2.2.1 – Cipher Types and Usage

    Objective:

    • Students will:
      • Be able to distinguish between block and stream ciphers.
      • Explain how block and stream ciphers operate.
      • Be able to provide examples of where these ciphers would be used.

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions

    Guiding Question:

    How are ciphers categorized in today’s usage and how are they used for the protection of data?

    Resources:

    • Lesson 2.2.1 – Cipher Types and Early Examples.pptx and Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx presentations and Lab 2.2.1 – Encrypting with ChaCha20 and AES form available on Google Classroom

    Assignment:

    1. Read the Lesson 2.2.1 – Cipher Types and Usage.pptx presentation in today’s class.
    2. Complete the Lab 2.2.1 – Encrypting with ChaCha20 and AES Activity form using the Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx Powerpoint Presentation posted in the Google Classroom.

    Assigned: April 13th, 2026
    Teacher Pacing Due Date: April 14th, 2026