Module/Workshop
How a Computer Works

Computer use is required of almost all professions in today’s technological world and yet how they work is mysterious.  This module starts from electrons and transistors and builds up to the major components of a computer.  It spends a significant portion of the time describing binary logic since that is fundamental to understanding a computer.  With the knowledge gained in this course a student will be able to describe how a computer works and will be able to understand the importance of various characteristics of the computer. 

5 Lessons
Module/Workshop
How Software Works

This module provides some instruction on the writing of code, but is primarily focused on how the code works.  Fundamentals of coding and memory handling are included.  Some security implications of these low-level memory operations are discussed.

5 Lessons

This is the second module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course.  The purpose of this module is to introduce students to the emerging discipline of cyber intelligence. The material is approached from the perspective of what are examples of sophisticated cyber threats and how are they driving businesses to consider an intelligence-driven approach to cyber security called cyber intelligence.

2 Lessons

This module focuses on cybersecurity concepts and principles. It lays the knowledge foundation for students who don’t have much experience in the subject matter. It aims to provide an overview of major factors that have distinct impacts on cybersecurity, including software, hardware, network, and people. As a high-level introduction, this module prepares students for hands-on work that illustrates the applications of malicious software and techniques (e.g., Keylogger), as well as defense (e.g., encryption).

6 Lessons

The goal of this course is to provide high school students and educators an introduction to the technological aspects of cyber security with hands on practice. This foundational course covers the following category of topics: legal and ethical issues; foundational knowledge required for cybersecurity and for hands on practice including: using the Linux command line, basics of computer networking and basics of web technology; steps in hacking including reconnaissance and exploits; cryptography; secure design of systems, and hardening operating systems.

Module/Workshop
Introduction to Digital Forensics Updated!

This module on digital forensics will familiarize you with forensics terminology and approaches, along with hands-on experience with a variety of forensic tools used by investigators to conduct incident response, find evidence of criminal behavior, and examine the effects of malware infection. The module will focus on Windows forensics and will use a Linux-based forensic workstation for hands-on analysis. Tools for conducting forensic examinations using a Windows system will also be introduced.

7 Lessons
Module/Workshop
Introduction to Ethical Hacking New!

This module covers an introduction to Ethical Hacking and an overview of the course. This is a third year advanced high school course. Students should have at least one cybersecurity class, knowledge of networks, and basic computer science skills before taking this course. The module covers attack Phases, threats, attack vectors, penetration testing tools, laws/ethics, and the basics of using the Cyber Range.

5 Lessons

This is the first module in the Cyber-Physical Industry course; however, it can be taught as a standalone module.  The purpose of this module is to introduce students to concepts associated with system assets and system operations in industrial control systems.

7 Lessons