Cybersecurity II

This course will be delivered via Canvas and can be accessed there.

As our world becomes increasingly dependent on technology, cybersecurity is a topic of growing importance. It is crucial that companies and individuals take precautions to protect themselves from the growing threat of cyber attacks.  As technology expands and the number of connected devices grows, so does the need for security and network experts. With over 300,000 job openings in the field, students can expect to learn real-world applications of network and security concepts that will open up a world of opportunities. This course is the capstone course of the cybersecurity pathway. In this course, students will learn advanced topics in the field of cybersecurity, including advanced cryptography, networking, risk assessment, and cyber defense.

Class Learning Objectives

There are 8 Units in this quarter class:

  1. Advanced Cryptography
    Students will apply advanced principles of cryptology. This includes explaining the core concepts of Public Key Infrastructure and hash functions. Students will explore concepts of encrypted email, digital certificates, and private key certificates. They will understand the different types of SSL certificates, the chain of trust and how a Certificate Authority (CA) works. 
  2. Project: Steganography
    Students will explore steganography and create their own encryption algorithm to conceal and hide a message within the pixels of an image. 
  3. Advanced Networking
    Students will explore and research network infrastructures and network security. They will demonstrate how to set up a virtual private network (VPN), and design and configure different types of networks. Students will also explain firewalls and how to initiate port scans.
  4. Project: IT Professional
    In this project, students will explore cybersecurity career pathways and build skills that will be needed within these fields such as communication.
  5. Cyber Defense
    Students will explore different types of network attacks and how to build up security walls to defend against them.
  6. Project: Security Assessment Report 
    Students complete a project that has them test a website for vulnerabilities and write a security assessment report based on their findings. 
  7. Project: Put it in Writing!
    In this project, students will develop a training policy that informs employees on matters of network security and details the company policy on preventative measures employees should take. 
  8. Risk Assessment
    Students will demonstrate skills in conducting vulnerability scans and recognizing vulnerabilities in security systems. They will conduct a security audit and examine port scanning, packet sniffing, and proxy servers to discover exploits in a system. Students will recommend security measures to mitigate the vulnerabilities.