Objective:
- Students will analyze common methods to secure data.
Standards:
CompTIA Security+ Objective(s)
- 3.3 – Compare and contrast concepts and strategies to protect data
- General data considerations
- Data states
- Data at rest
- Data in transit
- Data in use
- Data sovereignty
- Geolocation
- Methods to secure data
- Geographic restrictions
- Encryption
- Hashing
- Masking
- Tokenization
- Obfuscation
- Segmentation
- Permission restrictions
Guiding Question:
What are common methods to secure data?
Resources:
- Lesson 3.3.2 – Data Sovereignty and Protection.pptx and Lesson 3.3.2 Data Sovereignty and Protection Activity sheet available on Google Classroom
Assignment:
- Read the Lesson 3.3.2 – Data Sovereignty and Protection.pptx presentation in today’s class.
- Complete and hand in the Lesson 3.3.2 Data Sovereignty and Protection Activity Form posted in the Google Classroom (25 pts).
Assigned: April 23rd, 2026
Teacher Pacing Due Date: April 24th, 2026
Objective:
- Students will:
- Understand the purpose and role of SIEM systems in cybersecurity.
- Identify key components and architecture of a SIEM system.
- Examine the benefits and challenges of implementing a SIEM solution.
- Explore how SIEM systems are applied in real-world scenarios. identify appropriate uses for IDS, IPS, and EDR.
Standards:
CompTIA Security+ Objective(s)
- 4.4: Explain security alerting and monitoring concepts and tools.
Guiding Question:
What is a SIEM, and how does it improve cybersecurity operations?
Resources:
- Lesson 5.3.1 – SIEM Tools.pptx and Lab 5.3.1 – GoAccess.pptx presentations and Lab 5.3.1 – GoAccess Activity sheet available on Google Classroom
Assignment:
- Read the Lesson 5.3.1 – SIEM Tools.pptx presentation in today’s class.
- Complete the Lab 5.3.1 – GoAccess Activity Form using the Lab 5.3.1 – GoAccess.pptx Powerpoint Presentation posted in the Google Classroom.
- Hand in the completed Lab 5.3.1 – GoAccess Activity Form to complete the lab (50 pts).
Assigned: April 22nd, 2026
Teacher Pacing Due Date: April 23rd, 2026
Objective:
- Students will:
- Identify common cryptographic flaws and vulnerabilities in various systems.
- Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
- Analyze case studies of real-world cryptographic breaches to understand their impact.
- Evaluate the effectiveness of different cryptographic algorithms and protocols.
- Recommend best practices for securing cryptographic implementations in applications.
Standards:
CompTIA Security+ Objective(s):
3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.
- 2.4 Given a scenario, analyze indicators of malicious activity.
- Downgrade
- Collision
- Birthday
Guiding Question:
How does cryptography and encryption protect our daily digital interactions and ensure the security of information?
Resources:
- Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom
Assignment:
- Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
- Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
- Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).
Assigned: April 20th, 2026
Teacher Pacing Due Date: April 21st, 2026
Objectives:
- Students will be able to configure access control settings on a Linux-based system.
Standards:
CompTIA SY0-701 Objectives:
• 4.6.1 – Provisioning/de-provisioning user accounts
Guiding Question:
Why are access controls important, and why do we need them?
Resources:
- 5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom
Assignment:
- Read through the 5.2 Setting Access Controls.pptx presentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
- Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.
Assigned: March 26th, 2026
Teacher Pacing Due Date: March 27th, 2026
Objective:
- Students will investigate common methods to manage access..
Standards:
CompTIA Security+ SYO-701 Objective:
4.6 – Given a scenario, implement and maintain identity and access management
- Provisioning/de-provisioning user accounts
- Permission assignments and implications
- Identity proofing
- Federation
- Single sign-on (SSO)
- Lightweight Directory Access Protocol (LDAP)
- Open authorization (OAuth)
- Security Assertions Markup Language (SAML)
- Interoperability
- Attestation
- Access controls
- Mandatory
- Discretionary
- Role-based
- Rule-based
- Attribute-based
- Time-of-day restrictions
- Least privilege
- Privileged access management tools
- Just-in-time permissions
- Password vaulting
- Ephemeral credentials
Guiding Question:
What are some common methods to manage access?
Resources:
- Lesson 4.6.1 – Access Management.pptx Presentation and Case Study – Quantum Cryptography activity available on Google Classroom
Assignment:
- Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
- Complete the Case Study – Quantum Cryptography Activity using the document and Form posted in the Google Classroom.
Assigned: March 18th, 2026
Teacher Pacing Due Date: March 19th, 2026
Objective:
Students will be able to:
- Identify different types of data and their security needs.
- Understand the different data classifications.
- Explain the significance of regulatory compliance.
- Describe key data protection laws and best practices.
- Explain methods for securing data.
Standards:
CompTIA Security+ Objective(s)
- 3.3 Compare and contrast concepts and strategies to protect data.
Guiding Question:
What are the different types of data and why is their classification important?
Resources:
- Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom
Assignment:
- Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Microsoft PowerPoint slideshow in today’s class.
- Complete the CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity provided in Google Classroom. (25 pts)
Assigned: March 16th, 2026
Teacher Pacing Due Date: March 17th, 2026
It's dangerous to go alone!