Tag Archives: Unit 1

CYBER.ORG: AP Cybersecurity – Topic 2.2.2 – OSINT

Objective:

  • Students will investigate open source-online tools (OSINT) used to perform reconnaissance.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 6-8.DC.FOOT.1 -Recognize the many sources of data that make up a digital footprint
  • CSTA Compatibility Standards
    • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Guiding Question:

How and why is open-source intelligence used legally to gather free, public information?

Resources:

Assignment:

  1. Follow along with the 2.2.2 – OSINT.pptx presentation in today’s class.
  2. Complete the OSINT Report on Tony Stark Activity in class using the materials provided in Google Classroom.

Assigned: August 28th, 2025
Teacher Pacing Due Date: August 29th, 2025

CYBER.ORG: AP Cybersecurity – Topic 2.1.1 – Social Engineering

Objective:

  • Define the steps used in typical digital attacks.
  • Define social engineering as the human risk in organization security.
  • Identify techniques for social engineering and how to mitigate against these techniques.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
  • CSTA Compatibility Standards
    • 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Guiding Question:

How can we protect against social engineering?

Resources:

Assignment:

  1. Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
  2. Complete the Seven Steps of Hacking Activity in class using the materials provided.

Assigned: August 27th, 2025
Teacher Pacing Due Date: August 27th, 2025

CYBER.ORG: AP Cybersecurity – Topic 1.1.A – Threat Actors & Case Study – Stuxnet

Objective:

The student will analyze threat actors and their motivations.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 2.1 – Compare and contrast common threat actors and motivations

Guiding Question:

What are threat actors and their motivations?

Resources:

Assignment:

  1. Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
  2. Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
  3. Please do your best to complete the Case Study by end of day on Tuesday, August 26th.

Assigned: August 25th, 2025
Teacher Pacing Due Date: August 26th, 2025

CYBER.ORG: AP Cybersecurity – Topic 1.1: Understanding Adversaries – Intro to Social Engineering

Objective:

  • Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
  • Define social engineering and describe how attackers use it to exploit human behavior.
  • Explain what phishing is and how it could be used in a gaming scenario.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
    • 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.

Guiding Question:

How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?

Resources:

Assignment:

  1. Follow along with the Lesson 1.1.B presentation in today’s class.
  2. Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
  3. Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.

Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025