Objective:
- Students will compare and contrast various types of threat vectors.
Standards:
CompTIA Security+ SYO-701 Objective:
2.2 – Explain common threat vectors and attack surfaces
- Message-based
- Email
- Short Message Service (SMS)
- Instant Messaging (IM)
- Image-based
- File-based
- Voice call
- Removable device
- Vulnerable software
- Client-based vs agentless
- Unsupported systems and applications
- Unsecure networks
- Open service ports
- Default credentials
- Supply chain
- Managed service providers (MSPs)
- Vendors
- Supplies
Guiding Question:
- What are some different attack surfaces and threat vectors?
Resources:
Lesson 2.2.1 – Common Attack Surfaces.pptx Presentation and 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
- Read through the Lesson 2.2.1 – Common Attack Surfaces.pptx presentation in today’s class.
- Complete the 2.2.1 – Common Attack Surfaces – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: November 6th, 2025
Teacher Pacing Due Date: November 7th, 2025
Objective:
- Students will analyze potential indicators to determine the type of attack including logic bombs and rootkits.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
Guiding Question:
What are logic bombs and rootkits and how can enterprises defend themselves against them?
Resources:
- Lesson 2.4.6 – Logic Bomb & Rootkit.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.4.6 – Logic Bomb & Rootkit.pptx presentation in today’s class.
- Complete the Case Study – Logic Bomb Activity in class using the materials provided in Google Classroom.
Assigned: November 5th, 2025
Teacher Pacing Due Date: November 6th, 2025
Objective:
- Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
Guiding Question:
What are keyloggers and how can students defend against this attack?
Resources:
- Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.4.5 – Keyloggers.pptx presentation in today’s class.
- Complete the Lab – Intro to Keyloggers.pptx Activity in class using the materials provided in Google Classroom.
- To confirm completion the lab activity, upload a screenshot (with today’s date) of the captured keystrokes on the Kali system from the active keylogger session in the Windows environment to today’s Google Classroom post.
Assigned: November 4th, 2025
Teacher Pacing Due Date: November 5th, 2025
Objective:
- Students will potential indicators to determine attack types that include viruses, worms, spyware, bloatware and adware.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
- Malware attacks
- Worm
- Virus
- Spyware
- Bloatware
Guiding Question:
What are viruses, worms, spyware, bloatware and adware and how can enterprises defend themselves against these attacks?
Resources:
- Lesson 2.4.4 – Viruses, Worms, Spyware & Adware.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.4.4 – Viruses, Worms, Spyware & Adware.pptx presentation in today’s class.
- Complete the 2.4.4 – Viruses, Worms, Spyware & Adware – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: November 3rd, 2025
Teacher Pacing Due Date: November 4th, 2025
Objective:
- Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
Guiding Question:
What are trojans, backdoors, and RATs and how can students defend themselves against these attacks?
Resources:
- Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 2.4.3 – Trojans, Backdoors, and RATs.pptx presentation in today’s class.
- Complete the Lab – Trojan.pptx Activity in class using the materials provided in Google Classroom.
- Pair off in groups of two: One should play the Attacker, the other should play the Victim. Submit two screenshots: One of your Kali Linux Terminal window running the Meterpreter session (Attacker), and one of the Vulnerable Windows 7 with a “malicious_folder” created on the Desktop (Victim)!
- If you choose to fly solo on this one, you will need to submit both screenshots yourself!
Assigned: October 30th, 2025
Teacher Pacing Due Date: October 31st, 2025
Objective:
- Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
Guiding Question:
What is ransomware and cryptomalware and how can students defend themselves against these attacks?
Resources:
Assignment:
- Read the Lesson 2.4.2 – Ransomware.pptx presentation in today’s class.
- Complete the Lab – Ransomware.pptx Activity in class using the materials provided in Google Classroom.
- Submit a screenshot of your Cyber Range Windows 7 locked up with the red WannaCry ransomware message to receive credit for completion of this lab!
Assigned: October 29th, 2025
Teacher Pacing Due Date: October 30th, 2025
Objective:
- Students will analyze potential indicators to determine the type of attack.
Standards:
CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity
Guiding Question:
What are some common malware types?
Resources:
Assignment:
- Read the Lesson 2.4.1 – Malware.pptx presentation in today’s class.
- Complete the Case Study – Malware Activity in class using the materials provided in Google Classroom.
Assigned: October 28th, 2025
Teacher Pacing Due Date: October 29th, 2025
Objective:
- Students will analyze common methods to manage vulnerabilities.
Standards:
CompTIA Security+ SYO-701 Objective:
4.3 – Explain various activities associated with vulnerability management
- Analysis
- Confirmation
- False positive
- False negative
- Prioritize
- Common Vulnerability Scoring System (CVSS)
- Common Vulnerability Enumeration (CVE)
- Vulnerability classification
- Exposure factor
- Environmental variables
- Industry/organizational impact
- Risk tolerance
- Vulnerability response and remediation
- Patching
- Insurance
- Segmentation
- Compensating controls
- Exceptions and exemptions
- Validation of remediation
- Rescanning
- Audit
- Verification
- Reporting
Guiding Question:
- What are some common methods to identify vulnerabilities?
Resources:
Lesson 4.3.2 – Vulnerability Management.pptx Presentation and 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form available on Google Classroom
Assignment:
- Read through the 4.3.2 – Vulnerability Management.pptx presentation in today’s class.
- Complete the 4.3.2 – Vulnerability Management – Guided Notes – Fall 2025 Form using the materials provided.
Assigned: October 27th, 2025
Teacher Pacing Due Date: October 28th, 2025
It's dangerous to go alone!