About the Course
Cybersecurity is broken up into two years, Cybersecurity 1 and Cybersecurity 2. Cybersecurity 2 picks up where Cybersecurity 1 left off. In this course, students will dive deeper into the cybersecurity world. They will assess various types of attacks, from coding and application attacks. Students will examine numerous risk management tools and how to use them to secure systems. The course also has a strong focus on cryptography and PKI, the building blocks for creating confidentiality. Finally, students will examine various management policies that companies can implement to create a secure environment. At the end, students will create some major artifacts and demonstrate cyber defense in a hands on environment.
Big Idea 4: Threats, Vulnerabilities, and Common Attacks
Students examine various types of malware from viruses, worms, Trojans and examine other common attacks such as coding and application attacks.
Big Idea 5: Risk Management Tools
In this section, students will look into various tools and technologies that we can use to create defenses and implement secure elements.
Defense and Controls
Protecting Data with Backups
Business Continuity Elements
Big Idea 6: Cryptography and PKI
Students explore encryption, decryption, and hashing algorithms used in modern cryptography.
Big Idea 7: Personnel Management Policies
Student actively participate in incidence response systems.
Responding to Incidents
Major Project 1 – Hands on
The first of two major projects where students plan, design, and execute cyber penetration.
Major Project 2 – Hands on
The second of two major projects where students plan, design, and execute cyber defense.
As we approach the end of this course, we help students prepare for various certification exams.
In Partnership with,