Tag Archives: Unit 5 – Securing Applications and Data

APCK Cyber: AP Cybersecurity – Topic 5.2 Setting Access Controls

Objectives:

  • Students will be able to configure access control settings on a Linux-based system.

Standards:

CompTIA SY0-701 Objectives:

• 4.6.1 – Provisioning/de-provisioning user accounts

Guiding Question:

Why are access controls important, and why do we need them?

Resources:

  • 5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom

Assignment:

  1. Read through the 5.2 Setting Access Controls.pptx presentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
  2. Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.

Assigned: March 26th, 2026
Teacher Pacing Due Date: March 27th, 2026

CYBER.ORG: AP Cybersecurity – 4.6.1 – Access Management & Case Study – Quantum Cryptography

Objective:

  • Students will investigate common methods to manage access..

Standards:

CompTIA Security+ SYO-701 Objective:

4.6 – Given a scenario, implement and maintain identity and access management

  • Provisioning/de-provisioning user accounts
  • Permission assignments and implications
  • Identity proofing
  • Federation
  • Single sign-on (SSO)
    • Lightweight Directory Access Protocol (LDAP)
    • Open authorization (OAuth)
    • Security Assertions Markup Language (SAML)
  • Interoperability
  • Attestation
  • Access controls
    • Mandatory
    • Discretionary
    • Role-based
    • Rule-based
    • Attribute-based
    • Time-of-day restrictions
    • Least privilege
  • Privileged access management tools
    • Just-in-time permissions
    • Password vaulting
    • Ephemeral credentials

Guiding Question:

What are some common methods to manage access?

Resources:

  • Lesson 4.6.1 – Access Management.pptx Presentation and Case Study – Quantum Cryptography activity available on Google Classroom

Assignment:

  1. Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
  2. Complete the Case Study – Quantum Cryptography Activity using the document and Form posted in the Google Classroom.

Assigned: March 18th, 2026
Teacher Pacing Due Date: March 19th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.3.1 – Types of Data and Regulations Involved

Objective:

Students will be able to:

  • Identify different types of data and their security needs.
  • Understand the different data classifications.
  • Explain the significance of regulatory compliance.
  • Describe key data protection laws and best practices.
  • Explain methods for securing data.

Standards:

CompTIA Security+ Objective(s)

  • 3.3 Compare and contrast concepts and strategies to protect data.

Guiding Question:

What are the different types of data and why is their classification important?

Resources:

  • Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom

Assignment:

  1. Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx  Microsoft PowerPoint slideshow in today’s class.
  2. Complete the CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity provided in Google Classroom. (25 pts)

Assigned: March 16th, 2026
Teacher Pacing Due Date: March 17th, 2026