|Advanced Cryptography: In this module, students apply advanced principles of cryptology. This includes explaining the core concepts of Public Key Infrastructure and hash functions. Students explore concepts of encrypted email, digital certificates, and private key certificates. They also take a look at the different types of SSL certificates, the chain of trust, and how a Certificate Authority (CA) works.
|Project: Steganography: In this project, students explore steganography and create their own encryption algorithm to conceal and hide a message within the pixels of an image!
|Advanced Networking: In this module, students explore and research network infrastructures and network security. They will demonstrate how to set up a virtual private network (VPN), and design and configure different types of networks. Students will also take a look at firewalls and how to initiate port scans.
|Project: IT Professional: In this project, students explore cybersecurity career pathways and build skills that will be needed within these fields such as communication.
|Cyber Defense: In this module, students explore different types of network attacks and how to build up security walls to defend against them.
|Project: Put it in Writing!: In this project, students develop a training policy that informs employees on matters of network security and details the company policy on preventative measures employees should take.
|Risk Management: In this module, students demonstrate skills in conducting vulnerability scans and recognizing vulnerabilities in security systems. They will conduct a security audit and examine port scanning, packet sniffing, and proxy servers to discover exploits in a system. Students also are able to recommend security measures to mitigate the vulnerabilities.
|Project: The Game of Risk: In this project, students design and create a board game or a card game that will help players to identify randomized security vulnerabilities and their appropriate defenses.
|Final Exam: Students are assessed on topics learned throughout the course.
|What's Next?: Students explore the different pathways available to learn more about cybersecurity upon completing this course.
|Cryptocurrency: This module gives an introduction to cryptocurrencies and characteristics of its underlying technology, which is blockchain. It delves into the possibilities of how cryptocurrencies can solve some global banking problems, but also looks at the major deficiencies and problems of blockchain and cryptocurrency.
|Web Development: In this unit, students will go through a high level introduction to HTML, CSS, and the processes involved in viewing web pages on the internet. Students will create several simple web pages using the CodeHS online editor to gain practice using the various features of HTML and CSS.
|SQL Part II: The SQL: Continue learning more topics in SQL.
|More Cyber Topics:
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.Teacher Signup
Sign up as a student if you are in a school and have a class code given to you by your teacher.Student Signup