Cybersecurity is a comprehensive year-long course geared toward educators teaching high school cybersecurity. With over a hundred and fifty lesson topics and a plethora of activities, the Cybersecurity course provides the rigor and relevance expected for top quality cybersecurity education. Not only does Cybersecurity introduce real-world cybersecurity concepts and skills, it also prepares students to verify their technical know-how through the CompTIA Security+ certification.
Activities in Cybersecurity are designed for use with a cyber range, a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries. Activities and labs are portable and applicable across a variety of classroom lab configurations. It does not require any specific cyber range. All activities are "range agnostic."
More than just a course on “how to hack,” Cybersecurity lays a foundation of understanding cyber law and policy, Linux, networking technology basics, risk assessment, cryptography, and a variety of essential cybersecurity tools – all the essential knowledge and skills needed to begin a future in the cyber workforce.
In this unit, students will explore the basics of a Linux operating system.
In this unit, students will explore the basics of forensics, logs, and metadata.
In this unit, students will learn how passwords are stored and why stronger passwords are needed.
In this unit, students will explore different encryption methods and the importance of cryptography in cybersecurity.
In this unit, students will understand authentication methods and different security protocols that are used to keep users safe.
In this unit, students will understand the principles of social engineering and different threats that exist with social engineering.
In this unit, students will learn about different threat actors and vulnerabilities that exist.
In this unit, students are introduced to malware and some common types of malware.
In this unit, students will continue learning about different malware including malicious AI, fileless viruses, and buffer overflows.
In this unit, students will start to explore web application malware and vulnerabilities.
In this unit, students will explore wireless malware and vulnerabilities.
In this unit, students will learn about software development security, backups, and embedded systems.
In this unit, students will learn the basics of securing a network.