| Course: Foundations of Cybersecurity | |||
| 1st 9 Weeks | 2nd 9 Weeks | 3rd 9 Weeks | 4th 9 Weeks |
Unit(s): Unit 1 and 2 Career and Employment, Ethics/Social/Legal Issues Unit 3 and 4 Cybersecurity Concepts, Threats/vulnerabilities/cyber terrorism | Unit(s): Cont. Unit 4 Threat and Vulnerabilities Unit 5 Network and System Security | Unit(s): Unit 5 Network and System Security | Unit(s): Unit 6 Application Security Unit(s): Cont Unit 6 Applications Security Unit 7 Forensics |
• Unit I IT/Cyber Careers • Skills, Education and certifications • Resume, Portfolio • 1-3 weeks • Unit 2 Ethics, Social and Legal • 7 types of Hackers • Ethics of technologies • Legal Rules,Laws and regulation for IT/Social Media/etc.. • Fraud, abuse, Cyberbullying • Unit 3 and 4 Concepts and definition of Cybersecurity • CIA triad • Risk management, assessment of vulnerability and threats • warning or alerts of compromised system • Commonly used tools historically/current • Cyber Defense • IoT- Internet of Things | • Unit 4 and 5 Cyber Terrorism, Counter Terrorism • Malicious software, Trojans, Viruses, Worms and Ransomware, DDoS attacks, bots, botnets, zombies • Delivery techniques malicious software • Emerging threats • Social engineering, email, spoofing, backdoor dumpster diving • Protecting infrastructure, water, power grids, • Anti-virus, System security updates • Penetration testing | • Unit 5 Network and System Security • Network devices and security of connected devices • Network protections firewalls, Analyzing incoming and outgoing data traffic. common ports ID’s and purpose. Common protocols suites • Encryption, Assessment tools, open source tools. • Cyber - Attack signatures • Sandboxing, Virtual Machines. • Large scale management tools Scripting, imaging Group policies VPN,remote software distribution | • Unit 6 Application security • Password policies and vulnerabilities • Active directory/User groups and file right permissions • Detecting and removing malicious software ie trojan, viruses, malware etc… • Infrastructure Design and protection • Bring your own device safety and concerns • WiFi access and separation of networks • Auditing validating software version, history and license • Hosted or cloud based services • Continuity of IT/services change management • Unit 6 and 7 Security and Forensics • Disaster recovery point/time objective RPO/RTO • Data recovery backup • Forensics certifications CCE/CHFI/CFCE • Define Cybercrimes and digital investigations • Forensics toolkits and password recovery tool kit • Registry files, analyze and report Hard Disk recovery/image. • investigation and process of digital forensics evidence. |
Imbedded Activities: Unit 1 - Research and presentation of careers IT/Cyber. Top Cyber Certs. Unit 2 - Social ethics and Legal -Types of hackers. Hat categories. Current event in the news recent Cyber breaches. Geo-political state sponsored cyber threats. Imbedded Activities: https://mva.microsoft.com/ https://www.cybrary.it/ | Imbedded Activities: https://mva.microsoft.com/ OS hardening https://www.cybrary.it/ https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ | Imbedded Activities: https://mva.microsoft.com/ https://www.cybrary.it/ www.netacad.com | Imbedded Activities: https://mva.microsoft.com/ https://www.cybrary.it/
https://public.cyber.mil/training/cyber-awareness-challenge-2019/
Imbedded Activities: www.accessdata.com www.ncfta .net |
| Employability Skills | |||
Cycle 1: -Professionalism -Ethics 127.15(1)(A) 127.15(1)(E) 127.15(1)(F) 127.15(1)(G) 127.15(1)(H) 127.15(1)(I) 127.15(1)(K) 127.15(1)(L) 127.15(1)(M) | Cycle 2: -Teamwork -Problem Solving 127.15(1)(B) 127.15(1)(I) | Cycle 3: -Self Management Skill -Conflict Resolution -Leadership 127.15(1)(B) 127.15(1)(D) 127.15(1)(E) 127.15(1)(F) 127.15(1)(G) 127.15(1)(H) 127.15(1)(I) 127.15(1)(J) 127.15(1)(M) | Cycle 4: Communication Skills 127.15(1)(C) |
| CHOICES 360 Activities L2 | |||
| Work Values Sorter OR | Career Plan Builder OR | ||
| Saved Careers | Resume Builder |