Tag Archives: Unit 5

CYBER.ORG: AP Cybersecurity – Lesson 5.2.1 – IDS, IPS, and EDR

Objective:

  • Students will:
    • Define IDS, IPS, and EDR and describe their roles in cybersecurity.
    • Differentiate between IDS and IPS.
    • Explain how IDS, IPS, and EDR work together for layered security.
    • Analyze scenarios to identify appropriate uses for IDS, IPS, and EDR.

Standards:

CompTIA Pentest+ Objective(s):

  • 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
    • Infrastructure considerations
    • Intrusion prevention system (IPS)/intrusion detection system (IDS)

Guiding Question:

 How do IDS, IPS, and EDR contribute to a secure network?

Resources:

  • Lesson 5.2.1 – IDS, IPS, and EDR.pptx and 5.2.1 – IDS, IPS, and EDR Activity sheet available on Google Classroom

Assignment:

  1. Read the Lesson 5.2.1 – IDS, IPS, and EDR.pptx presentation in today’s class.
  2. Complete and hand in the completed 5.2.1 – IDS, IPS, and EDR Activity Form to complete the check for understanding activity (25 pts).

Assigned: April 21st, 2026
Teacher Pacing Due Date: April 22nd, 2026

CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Hashing Past and Present

Objective:

  • Students will:
    • Be able to explain the fundamental concepts of hashing and its historical development in computer science.
    • Identify and compare various hash functions, including MD5, SHA-1, SHA-2, and SHA-3, along with their applications and vulnerabilities.
    • Discuss the role of hashing in data integrity, security, and modern technologies such as blockchain.
    • Evaluate the implications of current challenges in hashing and consider future trends in cryptography, especially in the context of quantum computing.

Standards:

CompTIA Security+ SYO-701 Objective:

1.4 – Explain the importance of using appropriate cryptographic solutions

  • Hashing
  • Salting

    Guiding Question:

    What are the different types of encryption?

    Resources:

    • Lesson 2.3.1 – Hashing Past and Present.pptx and Lab 2.3.1 – Hashing.pptx presentations and Lab 2.3.1 – Hashing Activity sheet available on Google Classroom

    Assignment:

    1. Read the Lesson 2.3.1 – Hashing Past and Present.pptx presentation in today’s class.
    2. Complete the Lab 2.3.1 – Hashing Activity Form using the Lab 2.3.1 – Hashing.pptx Powerpoint Presentation posted in the Google Classroom.
    3. Hand in the completed Lab 2.3.1 – Hashing Activity Form to complete the lab (50 pts).

    Assigned: April 15th, 2026
    Teacher Pacing Due Date: April 16th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 2.2.1 – Cipher Types and Usage

    Objective:

    • Students will:
      • Be able to distinguish between block and stream ciphers.
      • Explain how block and stream ciphers operate.
      • Be able to provide examples of where these ciphers would be used.

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions

    Guiding Question:

    How are ciphers categorized in today’s usage and how are they used for the protection of data?

    Resources:

    • Lesson 2.2.1 – Cipher Types and Early Examples.pptx and Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx presentations and Lab 2.2.1 – Encrypting with ChaCha20 and AES form available on Google Classroom

    Assignment:

    1. Read the Lesson 2.2.1 – Cipher Types and Usage.pptx presentation in today’s class.
    2. Complete the Lab 2.2.1 – Encrypting with ChaCha20 and AES Activity form using the Lab 2.2.1 – Encrypting with ChaCha20 and AES.pptx Powerpoint Presentation posted in the Google Classroom.

    Assigned: April 13th, 2026
    Teacher Pacing Due Date: April 14th, 2026

    CYBER.ORG: AP Cybersecurity – Lesson 1.4.2 – Encryption

    Objective:

    • Students will summarize the basics of encryption.

    Standards:

    CompTIA Security+ SYO-701 Objective:

    1.4 – Explain the importance of using appropriate cryptographic solutions

    • Encryption
      • Level
        • Full-disk
        • Partition
        • File
        • Volume
        • Database
        • Record
      • Transport/communication
      • Asymmetric
      • Symmetric
      • Key exchange
      • Algorithms
      • Key length

    Guiding Question:

    What are the different types of encryption?

    Resources:

    • Lesson 1.4.2 – Encryption.pptx and Lab 1.4.2 – Linux Personal File Encryption.pptx presentations available on Google Classroom

    Assignment:

    1. Read the Lesson 1.4.2 – Encryption.pptx presentation in today’s class.
    2. Complete the Lab 1.4.2 – Linux Personal File Encryption Activity using the Lab 1.4.2 – Linux Personal File Encryption.pptx Powerpoint Presentation posted in the Google Classroom.
    3. To confirm completion of today’s Lab activity, post screenshots of the results of the Your Turn slide 13 (where you will share a simple .zip encrypted message with your partner) and slide 20 (where you will share an encrypted message with a shared key with your partner) to today’s Google Classroom assignment. Make sure your screenshots demonstrate the message received from your partner and the software you used to open the encrypted message.

    Assigned: April 1st, 2026
    Teacher Pacing Due Date: April 2nd, 2026