Please enable JavaScript to use CodeHS

Texas Foundations of Cybersecurity

Students develop the knowledge and skills needed to explore fundamental concepts related to the ethics, laws, and operations of cybersecurity by examining trends and operations of cyberattacks, threats, and vulnerabilities. The skills obtained in this course prepare students for additional study in cybersecurity.

Overview & Highlights

Level
High School
Contact Hours
155
Timeframe
Year

Course Overview

To view the entire syllabus, click here or click to explore the full course.

What is Cybersecurity?
Students explore the basics of cybersecurity. Students will learn about why cybersecurity is important, recent threats to cybersecurity, and different careers in the field.
Digital Citizenship and Cyber Hygiene
Students learn topics on Internet etiquette, how to stay safe on the web, potential effects of digital footprints, how to protect their information, and the implications of cyberbullying.
Project: Public Service Announcement
For this project, students create a Public Service Announcement (PSA) to teach their peers about digital citizenship and cyber hygiene. Students can select any of the topics covered so far.
The ABCs of Cryptography
Students dive into the history of cryptography systems, the motivation behind using encryption systems, and basic cryptography systems. Additionally, students explore topics on how to use cryptography, cryptology, and cryptanalysis to decode a message without the use of a key.
Project: Classic Cipher Newscast
In this project, students will get to create a newscast! This could be pre-recorded or presented live. Students will write, rehearse, and perform an approximately 5 – 10 minute newscast with their team. Each team will be given a different **classic cipher** (beyond Caesar and Vigenere) to research and address in their newscast.
System Administration
Students compare and contrast common operating systems (Windows, Linux, OS) and explain the importance of application security. Students investigate security options and implement user accounts to enforce authentication and authorization. Students also demonstrate how to work with basic and advanced command prompts.
Software Security
Students learn what happens when running a web application and how to look inside web apps using developer tools, source code, and more. Students learn basic SQL and common attacks like SQLi, and by the end of the module, students will be able to recommend solutions for flawed security systems.
Project: Security Assessment Report (SQLi)
In this project, students work as a consultant to a (fake) reputable company. They are tasked with testing the company's website for SQL injection and writing a security assessment report based on your findings.
Networking Fundamentals
Students explore the structure and design of the internet and networks, and how this design affects the reliability of network communication, the security of data, and personal privacy. Students learn how the Internet connects computers all over the world by using networking protocols.
IT Infrastructure
Students learn about the physical elements of computers and networking, such as motherboards, RAM, routers, and the use of port numbers, ethernet, and wireless devices.
Project: Troubleshooting
In this project, students explore the troubleshooting methodology and utilize it to solve sample IT support issues.
Project: IT Professional
In this project, you will explore cybersecurity career pathways and build skills that will be needed within these fields such as communication.
Project: Digital Forensics
In this project, students will work through fictitious forensic cases to practice collecting, examining, analyzing and reporting on data that they have unveiled.
Cyber Defense
In this module, you will explore different types of network attacks and how to build up security walls to defend against them.
Project: Security Assessment Report (XSS)
In this project, you will test a website for vulnerabilities and write a security assessment report based on your findings.
Risk Management
In this module, you will demonstrate skills in conducting vulnerability scans and recognizing vulnerabilities in security systems. You will conduct a security audit and examine port scanning, packet sniffing, and proxy servers to discover exploits in a system. You will also be able to recommend security measures to mitigate the vulnerabilities.
Project: The Game of Risk
In this project, you will design and create a board game or a card game that will help players to identify randomized security vulnerabilities and their appropriate defenses.
Final Exam
Students are assessed on topics learned throughout the course.
Introduction to Cybersecurity Pretest
Introduction to Cybersecurity Posttest

130
Lessons
112
Videos
64
Exercises
2
Challenges
156
Offline Handouts

Demo Programs

Explore programs that your students will build throughout this course!

Course Resources

Here are a few examples of teacher resources and materials to use in the Texas Foundations of Cybersecurity course

Standards

Texas Foundations of Cybersecurity is aligned with the following standards

Standards Framework View Alignment
Texas Foundations of Cybersecurity View (100%)

Customizable Assignments

Create and organize Assignments in any CodeHS course that you're teaching. You can even add custom assignments to pre-existing CodeHS courses.

Learn More

Actions for Teachers

Didn’t find what you were looking for? Here are a few links that might be useful to you.