Objective:
- Students will investigate open source-online tools (OSINT) used to perform reconnaissance.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 6-8.DC.FOOT.1 -Recognize the many sources of data that make up a digital footprint
- CSTA Compatibility Standards
- 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
Guiding Question:
How and why is open-source intelligence used legally to gather free, public information?
Resources:
Assignment:
- Follow along with the 2.2.2 – OSINT.pptx presentation in today’s class.
- Complete the OSINT Report on Tony Stark Activity in class using the materials provided in Google Classroom.
Assigned: August 28th, 2025
Teacher Pacing Due Date: August 29th, 2025
Objective:
- Define the steps used in typical digital attacks.
- Define social engineering as the human risk in organization security.
- Identify techniques for social engineering and how to mitigate against these techniques.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
- CSTA Compatibility Standards
- 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
Guiding Question:
How can we protect against social engineering?
Resources:
Assignment:
- Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
- Complete the Seven Steps of Hacking Activity in class using the materials provided.
Assigned: August 27th, 2025
Teacher Pacing Due Date: August 27th, 2025
Objective:
The student will analyze threat actors and their motivations.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 2.1 – Compare and contrast common threat actors and motivations
Guiding Question:
What are threat actors and their motivations?
Resources:
Assignment:
- Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
- Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
- Please do your best to complete the Case Study by end of day on Tuesday, August 26th.
Assigned: August 25th, 2025
Teacher Pacing Due Date: August 26th, 2025
Objective:
- Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
- Define social engineering and describe how attackers use it to exploit human behavior.
- Explain what phishing is and how it could be used in a gaming scenario.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
- 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.
Guiding Question:
How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?
Resources:
Assignment:
- Follow along with the Lesson 1.1.B presentation in today’s class.
- Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
- Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.
Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025
It's dangerous to go alone!