Cybersecurity

Cybersecurity
Cybersecurity
Spotlight Video
Overview
Pathways
Cybersecurity Pathway Overview
Courses

Intro to Cyber Security

  • Intro to Cyber Security
    CTE80120
    Spring
    Fall
    Open to all 9-12th graders (No prerequisites)

    508,000 That is the number of jobs that are currently unfilled in the field of Cybersecurity. Cybersecurity is an in-demand field that affects all industries. Cybersecurity threats are ongoing and pose risks for individuals and corporations alike. In this course, students will learn how to protect themselves and businesses from these attackers. This course will delve into the following topics: Citizen Security, Encryption, Types of Attacks, Networking, Cyber Defense, Ethics and Law, and Risk Management. We will use hands-on activities with industry tools to engage students.

Python in Cybersecurity

  • Python in Cybersecurity
    CTE80125
    Spring
    Fall
    Open to all 9-12th graders (Coding knowledge preferred, but not required)
    The cost of the certification exam is $59 and students will pay for their own certification.

    Python is an extremely versatile language that is used by startups and tech giants in the field such as Google, IBM, Drop Box, and Facebook to list a few. In the first quarter of this course, we will go through the basics of Python including: data types, variables, conditional statements, looping, functions, text files, and OOP. In the second half of this course, we will apply our Python programming knowledge to Cybersecurity related needs such as password cracking, automating systems, ethical hacking, and forensics. At the end of this course, students will have the opportunity to take the PCEP - Certified Entry Level Python Programming Certification.

Ethical Hacking

  • Ethical Hacking
    CTE80130
    Fall
    Must have completed either intro to Cybersecurity (CTE80120) or Cyber Patriots
    Open to 10-12th graders
    This course will be an introduction to the principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. The course covers planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. The student discovers how system vulnerabilities can be exploited and learns to avoid such problems. Students can practice what they have learned in a cloud based infrastructure with hands-on labs. These labs will simulate real life scenarios and will be accessible on any device that has a browser and an internet connection.