In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.
Students will be able to:
Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics
Explain the difference between symmetric and asymmetric encryption
In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.
Students will be able to:
In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.
Students will be able to:
In this lesson, students learn how asymmetric encryption uses public and private keys to encrypt data and they learn how the RSA algorithm addresses the security issue of key authentication. Students also explore different examples of asymmetric encryption algorithms and evaluate them to determine what aspects make an algorithm strong.
Students will be able to:
In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security.
Students will be able to:
In this lesson, students review content with a 15 question Unit Quiz.
Students will be able to:
In this project, students will learn about steganography and how it is used to encrypt data. Students will develop their own encryption algorithm to hide a message in an image by manipulating the hexadecimal color codes of an image.
Students will be able to:
This lesson is an introduction to network attacks. Students review how data is transmitted over the internet and learn how attacks occur by exploiting vulnerabilities in open ports.
Students will be able to:
In this lesson, students learn about the different types of malware as well as how to detect, prevent, and remove malware. Students learn how anti-malware software works and explore various tools different operating systems have to detect and prevent malware.
Students will be able to:
In this lesson, students learn about social engineering and how it is used in cyber attacks. Students also learn what DoS and DDoS attacks are and how they use internet protocols to overwhelm a network.
Students will be able to:
In this lesson, students learn about additional common cyber attacks, such as zero day attacks, botnet attacks, rainbow table attacks and man-in-the-middle attacks. Students will explore famous cyber attacks (3ve, Mirai, and Stuxnet) and reflect on what we can learn from past attacks to strengthen present network security.
Students will be able to:
In this lesson, students will learn about and discuss cross-site scripting (XSS), which is another major OWASP (Open Web Application Security Project) cybersecurity risk.
Students will be able to:
In this lesson, students learn about how to increase the security of a network by keeping individual, physical devices secure. Students learn about best practices for ensuring only authorized users log into a device as well as consider how user permissions and data loss prevention (DLP) can ensure sensitive data remains secure.
Students will be able to:
In this lesson, students conduct online research regarding topics of internet, cell phone, and video game addiction, synthesize the information, and determine their own conclusions.
Students will be able to:
In this lesson, students explore key cybersecurity concepts, including the differences between network vs. application attacks and threats vs. vulnerabilities. Students engage in interactive activities and a case investigation to apply their understanding of cyber threats and ethical decision-making.
In this lesson, students examine real-world security breaches to understand how unauthorized access impacts data, systems, and services. Students analyze high-profile cases to identify vulnerabilities and apply cybersecurity principles for stronger protection.
In this lesson, students explore key network security protocols like HTTPS, VPN, and MFA through an interactive challenge and research-based investigation. Students research each protocol’s purpose, features, and vulnerabilities, then compile their findings in a comparative chart to understand how these tools work together to secure digital communication.
In this lesson, students review the concept of a security baseline and its role in maintaining strong cybersecurity practices. Through a skit activity and hands-on exploration of baseline tools, students learn how to identify and apply essential security measures.
In this lab, students will research, install, configure, and document the process of setting up anti-virus software to secure a system. They will compare multiple anti-virus options based on effectiveness, system requirements, and cost, and then install and configure their chosen software to enhance system security.
Students will be able to:
In this project, students will work through fictitious forensic cases to practice collecting, examining, analyzing and reporting on data that they have unveiled. In this portion of the project, students will learn what digital forensics is, what types of data can be used, and how the chain of custody must be kept throughout the whole process to protect the integrity of the data.
Students will be able to:
In this portion of the project, students will examine and analyze event log data collected from a system firewall. They will report on their findings to either support or refute the claim given in the introduction activity.
Students will be able to:
In this portion of the project, students will examine and analyze file metadata collected from a word processing program. They will report on their findings to either support or refute the claim given in the introduction activity.
Students will be able to:
In this portion of the project, students will examine and analyze exif data collected from the inspector tool of an image viewing program. They will also use a command line interface simulation to unveil even more exif data. They will report on their findings to either support or refute the claim given in the introduction activity.
Students will be able to:
In this lesson, students will build upon their foundational knowledge of networks to learn about advanced network devices. Students will delve into devices that enable communication and data sharing, such as servers and load balancers, as well as devices that increase network security, such as firewalls, IDP, IPD, and UTM. In sum, students will understand how complex networks use a variety of devices, each playing an important role in the functionality and security of the network.
Students will be able to:
In this lesson, students will learn about the many protocols and standards that are used to send and receive information across a network. Students will learn how networks use specific ports and protocols, each with a specific purpose, such as sending and receiving emails. Students will also learn about wireless networking standards and how frequency and channels relate to speed of data transmission.
Students will be able to:
In this lesson, students will build on their knowledge of networks and consider how to ensure the perimeter of a network is secure. Students will learn about different devices that can be used to secure a company’s intranet from the internet as well as ways to enable remote access to the intranet.
Students will be able to:
In this lesson, students will extend their understanding of securing a network to include securing mobile devices. Students will learn about best practices for mobile device security as well as how BYOD (bring your own device) policies have impacted a company’s network security.
Students will be able to:
At this point, students have a strong understanding of how different devices can be used to configure a secure network. In this lesson, students will learn how access controls and the AAA protocol (authentication, authorization, and accounting) can be used to ensure only authorized personnel access a network.
Students will be able to:
In this lesson, students review content with a 20 question Unit Quiz.
Students will be able to:
In this lesson, students learn about core networking concepts, including static vs. dynamic routing, common network topologies, and subnetting. Students engage in research, hands-on exploration, and design tasks to understand how networks are structured, routed, and segmented for efficiency and security.
In this lesson, students explore how networks function through client-server models, intranet and extranet systems, and essential internet services like DNS, NAT, and DHCP. Students conduct research, complete creative submissions, and build visual illustrations to deepen their understanding of how these foundational technologies support online communication and connectivity.
In this lab, students will explore Windows networking settings and how they can configure and customize their online experience.
In this lab, students are introduced to CSMA/CD and CSMA/CA, two network protocols designed to manage data transmission and prevent or handle collisions on shared communication channels.
In this lesson, students will design and create a magazine that explains key concepts related to Local Area Networks (LANs), including methodologies, topologies, Ethernet standards, and cabling. Through research and creative design, students will develop engaging magazine sections that illustrate technical information in a reader-friendly format.
Students will be able to:
In this lesson, students are introduced to the concept of risk assessment, and students learn about the role of vulnerability scans in detecting weaknesses. Students also learn about honeypots and packet sniffing and explore how these tools can be used to detect vulnerabilities and improve the security of a network.
Students will be able to:
In this lesson, students will identify, assess, and prioritize risks based on their potential impacts. Students will utilize prior knowledge to connect to the concept of prioritizing risks. They will learn new types of vulnerabilities such as input and error handling.
Students will be able to:
In this lesson, students continue to deepen their understanding of risk assessment. Students learn how to prioritize and respond to different threats by calculating risk, both quantitatively and qualitatively.
Students will be able to:
In this lesson, students learn about penetration testing and how pen tests extend vulnerability scans by attempting to exploit weaknesses in addition to finding them. Students have the opportunity to engage in a pen test simulation as well as learn about the next evolution of pen testing, chaos engineering.
Students will be able to:
In this portion of the project, students will come up with a fictitious company and feel the impact of reacting to a security breach without any pre-developed policy in place. Students will then learn about some of the common policies companies put in place and set forth on the task of developing strong policies for their company.
Students will be able to:
Incident response plans are essential to ensure that companies are prepared to effectively respond to any breach in security. In this portion of the project, students will develop a set of policies regarding strong passwords and employee training. They will test their policies against a series of employee negligence scenarios and reflect on what would need to be added to strengthen their policy.
Students will be able to:
In this portion of the project, students will create an abbreviated Incident Response plan. They will respond to a cyber attack using their IR plan and reflect on how they were able to handle this attack as well as how to strengthen their policy.
Students will be able to:
Data can be one of a company’s most valuable resources, not to mention most regulated. Developing a strong plan for keeping data secure is essential, especially as more and more companies turn to the cloud to keep track of the massive amounts of data that are being collected every day. In this portion of the project, students will review an example privacy policy and then complete their own abbreviated policy. They will test their data policies against a data breach and reflect on what would need to be added to strengthen their policy.
Students will be able to:
Change management is the approach to preparing and supporting individuals and/or teams to successfully adopt organizational change. When implementing changes within a company, it is essential to consider how you will present the change to employees and support them in adopting and implementing the change. In this portion of the project, students will synthesize the changes that need to be made to strengthen their policies. They will develop a change management plan to implement new policies effectively.
Students will be able to:
In this lesson, students will explore the language of computers, including programming languages, variables, and data types.
Students will be able to:
In this lesson, students will learn how to make the most basic python program- one that displays text on the screen. Students will learn how to print in python using the print statement. They will also learn how to use quotations, apostrophes, and strings.
Students will be able to:
In this lesson, students will be reintroduced to the concept of variables, which store information in a program to be used later. Students will also learn about three different variable types- strings, integers, and floating point numbers.
Students will be able to:
In this lesson, students revisit user input. They learn how to request user input as both strings and integers, learn where the input is stored, and learn how to convert strings and integers.
Students will be able to:
In this lesson, students will learn about using mathematical operators in their Python programs. They will work through multiple examples to get comfortable with operator precedence and using different types of operators.
Students will be able to:
In this lesson, students will be able to perform string operations in order to concatenate values together.
Students will be able to:
In this lesson, students revisit the concept of comments. Comments are helpful because they allow programmers to leave notes about the program they are writing.
Students will be able to:
In this lesson, students review content with a 20 question Unit Quiz.
Students will be able to:
In this lesson, students will revisit the concept of boolean values. Booleans refer to a value that is either true or false. Named after English-born mathematician, philosopher and logician, George Boole, Booleans are used to test whether a condition is true or false.
Students will be able to:
In this lesson, students will review how to use If and if/else statements. These statements allow programmers to use conditions to determine how their code should run.
Students will be able to:
In this lesson, students will dive into comparison operators. Comparison operators give the ability to compare two values. Using comparison operators in programming is similar to math in that less than <, greater than >, less than or equal to <=, and greater than or equal to >= are the same. The differences are that operators for equal to are == and not equal are !=. Using comparison operators allow programs to make decisions.
Students will be able to:
In this lesson, students will look at logical operators. Logical operators give the ability to connect or modify Boolean expressions. Three logical operators are NOT
(!), or
and and
. These logical operators can be used in combination. With these logical operators, logical statements can be constructed, such as “I go to sleep when I am tired OR it’s after 9pm”, “I wear flip flops when I am outside AND it is NOT raining”.
Students will be able to:
or
, and
, and NOT
(!) In this lesson, students learn about the intricacies of floating point numbers. When using comparison operators with floating point numbers in Python, we will sometimes see strange behavior because of bizarre rounding methods. When using a comparison operator with floating point numbers, you should use round(x)
to avoid strange rounding behavior. round(x, n)
will round the float x
to n
decimal places. round(x)
will round the float x
to 0 decimal places.
Students will be able to:
In this lesson, students will be introduced to the basics of shell scripting. The lesson covers what shell scripting is and allows students to write basic scripts.
Students will be able to:
In this lesson, students review content with a 15 question Unit Quiz.
Students will be able to:
In this lesson, students learn the basics of the Engineering Design Process. This is a step-by-step process that helps developers and entrepreneurs develop their products while considering their end-users and testing out products before releasing them.
Throughout the module, students will use the design process to develop an app, tool, or strategy that provides a solution to a cybersecurity issue.
Students will be able to:
In this lesson, students learn more about the value of Empathy in the design process. Empathy is the ability to understand and share the feelings of another, and is the most important tenet of design thinking. Students will practice building empathy by interviewing classmates and evaluating the accessibility of existing tools/apps/websites.
Students will be able to:
In this lesson, students will take the information that they gathered in their interviews with peers to define a specific problem that needs to be solved. Students will create Point of View statements and composite characters to make a profile of the users who are in need of a fix to the problem that students define.
Students will be able to:
In this lesson, students will learn strategies to help them ideate solutions to the problems they have been exploring throughout the module. Students will spend class time brainstorming with classmates, and encouraging one another to come up with out of the box solutions.
Students will be able to:
In this lesson, students learn the basics of prototyping. Students will create a prototype based on ideas they came up with for their design project, and present prototypes to classmates for critiquing.
Students will be able to:
In this lesson, students will test one another’s prototypes and provide constructive feedback about its usability and aesthetic appeal. Students will also ask thoughtful questions of the testers to get a better understanding of their experience interacting with the prototype.
Students will be able to:
In this lesson, students will deliver a 10-minute presentation showcasing their findings and final product.
Students will be able to: