STEM & Information Technology cluster

Cybersecurity Pathway

Level 1. Introductory

Foundations of Cybersecurity

Explore fundamental cybersecurity concepts, threats, and defenses..

About Course

Unlock the world of computer science

In the 'Foundations of Cybersecurity' course, students explore key concepts like online threats, cryptography, networking, coding, and risk management. Through hands-on labs and real-world scenarios, they secure systems, encrypt data, and develop secure code, culminating in a team project to protect a simulated network.

Skills

Skill-up approach

Threat identification

 Cryptography

Networking fundamentals

Problem-solving 

Risk management  

Secure coding 

Critical thinking

System administration

Syllabus

Step-by-step to the Result

1

What is Cybersecurity?

  • Define key cybersecurity concepts

  • Implement safe online practices

  • Explore various cybersecurity careers and essential tools

Project: Vulnerability analysis and report using TryHackMe

2

Introduction to Cryptography

  • Understand encryption and decryption basics

  • Apply historical and modern cryptographic techniques

  • Explain the use of public/private keys and hash functions

Project: Encrypt/Decrypt project using CrypTool

3

Networking Fundamentals

  • Learn key networking concepts

  • Configure basic network security

  • Explore wireless security and use of network monitoring tools

Project: Network configuration project using Packet Tracer

4

Secure Coding

  • Master coding basics

  • Write secure code and automate security tasks

Project:  Secure coding project in Trinket

5

Risk Management

  • Identify and assess cyber risks 

  • Develop risk mitigation strategies 

  • Understand cybersecurity laws and ethical considerations

Project: Cybersecurity risk assessment and mitigation plan

Hands-on Projects

Case-based Portfolio

"Foundations of Cybersecurity" final project

Students are hired as cybersecurity experts to protect a small business facing cyber threats like phishing and data breaches. Using encryption, secure networking, and automated security scripts, they will safeguard sensitive data and ensure the business runs securely online!

Testimonials

What Our Students Think

Student learning with YaizY is more dynamic, engaging, and applicable to the real world!  See what our students say about it!

Tech Requirements

Fully web-based learning for a seamless implementation

Hardware & Software & Internet Speed

  • PC/Laptop or Chromebook;

  • Web camera and Headset;

  • Stable Internet connection from 30 Mbit/s/

Web tools only

  • Coding tools;

  • Networking tools;

  • Cryptography tool;

  • Google Workspace

Try our demo today!

Unlock the full potential of immersive learning and elevate your students' experience. Get started with a personalized demo now!