Skip to content

High School Cybersecurity Essentials

FlexPoint digital courses are mobile-friendly and customizable. Course availability will differ by licensing model. Please confirm course selections with your FlexPoint account manager.

Description

Have you or someone you know ever had personal information compromised? This inspiring course covers defensive strategies for computer, mobile device, and network security. You’ll experience a hands-on approach to security strategies, expand your computer and networking security techniques, and improve your problem-solving skills. You will also explore numerous employment opportunities and prepare for one of the fastest-growing industries: cybersecurity. Cybersecurity Essentials is the third course in the Applied Cybersecurity program of study in the Information Technology career cluster.

Segment One

Module 01 - Preserving Cybersecurity

  • Maintaining cybersecurity
  • Security breaches
  • Industry certification
  • Intrusion
  • Hackers
  • Cyber kill chain
  • Dark web
  • Cyberattacks
  • CIA triad
  • Defense mechanisms
  • Security controls
  • Countermeasures
  • Cybersecurity careers

Module 02 - Vulnerabilities

  • Vulnerabilities
  • Default values
  • Footprinting and port scanning
  • DOS and DDOS
  • Spoofing
  • Malware
  • Viruses and logic bombs
  • DNS poisoning
  • Hash functions
  • Encryption
  • Digital signatures and certificates

Module 03 - Access Control

  • Types of access control
  • Access control models
  • Password management
  • Types of firewalls
  • Firewall configuration
  • Intrusion prevention systems
  • Honeypots
  • Access control policies
  • Multifactor authentication
  • CIRT
  • Incident response


Segment Two

Module 04 - Intrusion Detection Systems

  • Intrusion detection systems
  • NIDS Sensors
  • Signature and behavior detection
  • Security appliances
  • Data loss prevention
  • Spam filters
  • Zero-day attacks
  • Port, network, and vulnerability scanning
  • Cybersecurity careers

Module 05 - Network Security

  • Virtual computing environments
  • Virtualization security and vulnerabilities
  • Hypervisors
  • Types of social engineering
  • Consequences of social engineering
  • Social media vulnerabilities
  • Network design principles
  • Careers in network administration

Module 06 - Cybersecurity and the Workplace

  • Workplace safety
  • Emergency procedures
  • Emergency action plans
  • Leadership
  • Communication
  • Mentoring
  • Entrepreneurship
  • Résumés and cover letters
  • Business communication