Please enable JavaScript to use CodeHS

South Carolina Cybersecurity Fundamentals

In this course, students will examine the core concepts and terminology of cybersecurity and information assurance, integrating the importance of user involvement, network architecture, threats, and security; operational and system security; cryptography, and a broad range of other topics all through the CodeHS web-based platform. This is a yearlong course that is designed for beginners to intermediate computer science students with at least some knowledge and interest in computer science.

Overview & Highlights

Level
High School
Contact Hours
130
Timeframe
Year

Course Overview

To view the entire syllabus, click here or click to explore the full course.

What is Cybersecurity?
Students explore the basics of cybersecurity. Students will learn about why cybersecurity is important, recent threats to cybersecurity, and different careers in the field.
Digital Citizenship and Cyber Hygiene
Students learn about Internet etiquette and how to stay safe on the world wide web. Students also look at the potential effects of our digital footprints, how to protect information from online risks, and the implications of cyberbullying. Finally, the module includes how to find and cite quality resources online.
Project: Public Service Announcement
For this project, students create a Public Service Announcement (PSA) to teach their peers about digital citizenship and cyber hygiene. Students can select any of the topics covered so far.
The ABCs of Cryptography
Students dive into the history of cryptography systems, the motivation behind using encryption systems, and basic cryptography systems. Additionally, students explore topics on how to use cryptography, cryptology, and cryptanalysis to decode a message without the use of a key.
Advanced Cryptography
In this module, you will apply advanced principles of cryptology. This includes explaining the core concepts of Public Key Infrastructure and hash functions. You will explore concepts of encrypted email, digital certificates, and private key certificates. You will also take a look at the different types of SSL certificates, the chain of trust and how a Certificate Authority (CA) works.
Project: Steganography
In this project, you will explore steganography and create your own encryption algorithm to conceal and hide a message within the pixels of an image!
System Administration
Students compare and contrast common operating systems (Windows, Linux, OS) and explain the importance of application security. Students investigate security options and implement user accounts to enforce authentication and authorization. Students also demonstrate how to work with basic and advanced command prompts.
Cyber Defense
Students learn what happens when running a web application and how to look inside web apps using developer tools, source code, and more. Students learn basic SQL and common attacks like SQLi, and by the end of the module, students will be able to recommend solutions for flawed security systems.
Project: Security Assessment Report
In this project, students work as a consultant to a (fake) reputable company. They are tasked with testing the company's website for SQL injection and writing a security assessment report based on your findings.
Networking Fundamentals
Students explore the structure and design of the internet and networks, and how this design affects the reliability of network communication, the security of data, and personal privacy. Students learn how the Internet connects computers all over the world by using networking protocols.
IT Infrastructure
Students learn about the physical elements of computers and networking, such as motherboards, RAM, routers, and the use of port numbers, ethernet, and wireless devices.
Project: Troubleshooting
In this project, students explore the troubleshooting methodology and utilize it to solve sample IT support issues.
Risk Management
In this module, you will demonstrate skills in conducting vulnerability scans and recognizing vulnerabilities in security systems. You will conduct a security audit and examine port scanning, packet sniffing, and proxy servers to discover exploits in a system. You will also be able to recommend security measures to mitigate the vulnerabilities.
Final Exam
Students are assessed on topics learned throughout the course.
What's Next?
Students will explore the different pathways available to learn more about cybersecurity upon completing this course.
Introduction to Cybersecurity Pretest
Introduction to Cybersecurity Posttest

127
Lessons
115
Videos
66
Exercises
3
Challenges
152
Offline Handouts

Demo Programs

Explore programs that your students will build throughout this course!

Course Resources

Here are a few examples of teacher resources and materials to use in the South Carolina Cybersecurity Fundamentals course

Standards

South Carolina Cybersecurity Fundamentals is aligned with the following standards

Standards Framework View Alignment
SC Cybersecurity Fundamentals View (100%)

Customizable Assignments

Create and organize Assignments in any CodeHS course that you're teaching. You can even add custom assignments to pre-existing CodeHS courses.

Learn More

Actions for Teachers

Didn’t find what you were looking for? Here are a few links that might be useful to you.