Tag Archives: Unit 5 – Securing Applications and Data

CYBER.ORG: AP Cybersecurity – Lesson 3.3.2 – Data Sovereignty and Protection

Objective:

  • Students will analyze common methods to secure data.

Standards:

CompTIA Security+ Objective(s)

  • 3.3 – Compare and contrast concepts and strategies to protect data
    • General data considerations
    • Data states
      • Data at rest
      • Data in transit
      • Data in use
    • Data sovereignty
    • Geolocation
  • Methods to secure data
    • Geographic restrictions
    • Encryption
    • Hashing
    • Masking
    • Tokenization
    • Obfuscation
    • Segmentation
    • Permission restrictions

Guiding Question:

What are common methods to secure data?

Resources:

  • Lesson 3.3.2 – Data Sovereignty and Protection.pptx and Lesson 3.3.2 Data Sovereignty and Protection Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 3.3.2 – Data Sovereignty and Protection.pptx presentation in today’s class.
  2. Complete and hand in the Lesson 3.3.2 Data Sovereignty and Protection Activity Form posted in the Google Classroom (25 pts).

Assigned: April 23rd, 2026
Teacher Pacing Due Date: April 24th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 5.3.1 – SIEM Tools

Objective:

  • Students will:
    • Understand the purpose and role of SIEM systems in cybersecurity.
    • Identify key components and architecture of a SIEM system.
    • Examine the benefits and challenges of implementing a SIEM solution.
    • Explore how SIEM systems are applied in real-world scenarios. identify appropriate uses for IDS, IPS, and EDR.

Standards:

CompTIA Security+ Objective(s)

  • 4.4: Explain security alerting and monitoring concepts and tools.
    • Tools

Guiding Question:

 What is a SIEM, and how does it improve cybersecurity operations?

Resources:

  • Lesson 5.3.1 – SIEM Tools.pptx and Lab 5.3.1 – GoAccess.pptx presentations and Lab 5.3.1 – GoAccess Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 5.3.1 – SIEM Tools.pptx presentation in today’s class.
  2. Complete the Lab 5.3.1 – GoAccess Activity Form using the Lab 5.3.1 – GoAccess.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 5.3.1 – GoAccess Activity Form to complete the lab (50 pts).

Assigned: April 22nd, 2026
Teacher Pacing Due Date: April 23rd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.6.1 – Cryptographic Flaws and Attacks

Objective:

  • Students will:
    • Identify common cryptographic flaws and vulnerabilities in various systems.
    • Explain how specific attacks, such as man-in-the-middle or brute force attacks, exploit these flaws.
    • Analyze case studies of real-world cryptographic breaches to understand their impact.
    • Evaluate the effectiveness of different cryptographic algorithms and protocols.
    • Recommend best practices for securing cryptographic implementations in applications.

Standards:


CompTIA Security+ Objective(s):

3B-NI-04 – Compare ways software developers protect devices and information from unauthorized access.

  • 2.4 Given a scenario, analyze indicators of malicious activity.
    • Downgrade
    • Collision
    • Birthday

Guiding Question:

How does cryptography and encryption protect our daily digital interactions and ensure the security of information?

Resources:

  • Lesson 2.6.1 – Cryptographic Flaws and Attacks.pptx and Lab 2.6.1 – RSA Key Generation and Secure Shell.pptx presentations and Lab 2.5.1 – Caesar and GPG Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 2.5.1 – Daily Application of Cryptography and Encryption.pptx presentation in today’s class.
  2. Complete the Lab 2.5.1 – Caesar and GPG Activity Form using the Lab 2.5.1 – Caesar and GPG.pptx Powerpoint Presentation posted in the Google Classroom.
  3. Hand in the completed Lab 2.6.1 – RSA Key Generation and Secure Shell Activity Form to complete the lab (50 pts).

Assigned: April 20th, 2026
Teacher Pacing Due Date: April 21st, 2026

APCK Cyber: AP Cybersecurity – Topic 5.2 Setting Access Controls

Objectives:

  • Students will be able to configure access control settings on a Linux-based system.

Standards:

CompTIA SY0-701 Objectives:

• 4.6.1 – Provisioning/de-provisioning user accounts

Guiding Question:

Why are access controls important, and why do we need them?

Resources:

  • 5.2 Setting Access Controls.pptx and 5.2 Setting Access Controls Lab Instructions – Student Activity Guide available on Google Classroom

Assignment:

  1. Read through the 5.2 Setting Access Controls.pptx presentation in today’s class. We will work through the steps provided in the presentation in today’s Lab activity.
  2. Follow along with the 5.2 Setting Access Controls Lab Instructions – Student Activity Guide provided in Google Classroom and answer the questions to complete the lab activity.

Assigned: March 26th, 2026
Teacher Pacing Due Date: March 27th, 2026

CYBER.ORG: AP Cybersecurity – 4.6.1 – Access Management & Case Study – Quantum Cryptography

Objective:

  • Students will investigate common methods to manage access..

Standards:

CompTIA Security+ SYO-701 Objective:

4.6 – Given a scenario, implement and maintain identity and access management

  • Provisioning/de-provisioning user accounts
  • Permission assignments and implications
  • Identity proofing
  • Federation
  • Single sign-on (SSO)
    • Lightweight Directory Access Protocol (LDAP)
    • Open authorization (OAuth)
    • Security Assertions Markup Language (SAML)
  • Interoperability
  • Attestation
  • Access controls
    • Mandatory
    • Discretionary
    • Role-based
    • Rule-based
    • Attribute-based
    • Time-of-day restrictions
    • Least privilege
  • Privileged access management tools
    • Just-in-time permissions
    • Password vaulting
    • Ephemeral credentials

Guiding Question:

What are some common methods to manage access?

Resources:

  • Lesson 4.6.1 – Access Management.pptx Presentation and Case Study – Quantum Cryptography activity available on Google Classroom

Assignment:

  1. Read the Lesson 4.6.1 – Access Management.pptx presentation in today’s class.
  2. Complete the Case Study – Quantum Cryptography Activity using the document and Form posted in the Google Classroom.

Assigned: March 18th, 2026
Teacher Pacing Due Date: March 19th, 2026

CYBER.ORG: AP Cybersecurity – Lesson 1.3.1 – Types of Data and Regulations Involved

Objective:

Students will be able to:

  • Identify different types of data and their security needs.
  • Understand the different data classifications.
  • Explain the significance of regulatory compliance.
  • Describe key data protection laws and best practices.
  • Explain methods for securing data.

Standards:

CompTIA Security+ Objective(s)

  • 3.3 Compare and contrast concepts and strategies to protect data.

Guiding Question:

What are the different types of data and why is their classification important?

Resources:

  • Lesson Slides Lesson 1.3.1 – Types of Data and Regulations Involved.pptx Presentation, CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity available on Google Classroom

Assignment:

  1. Read the Lesson 1.3.1 – Types of Data and Regulations Involved.pptx  Microsoft PowerPoint slideshow in today’s class.
  2. Complete the CFU Activity 1.3.1 – Types of Data and Regulations Involved Activity provided in Google Classroom. (25 pts)

Assigned: March 16th, 2026
Teacher Pacing Due Date: March 17th, 2026