Cyber Security We live in a digital world. Whether it s keeping in touch with friends, operating a city s energy grid or strengthening national security, it happens online. The need to secure our networks has never been greater. The number of cyber attacks increases dramatically every year, and people with technical skills are needed to ensure online security. As a student in the Cybersecurity program at the Public Service Leadership Academy at Fowler, you ll learn how to make online information more secure and protect users from the growing threat of cyber attacks. This program teaches the core concepts needed to understand, assess and protect information security systems. This pathway will develop the knowledge and skills needed to master the core concepts in cybersecurity. The pathway will cover the three foundation areas of information security: Networking Operating Systems Systems Administration CAREER OPPORTUNITIES: Security Manager, Cyber Threat Analyst 59
Course of Study Cyber Security 9th Grade 10th Grade 11th Grade 12th Grade PSLA Exploratory (1 Credit CTE) CTE Cyber Security 100 CSS100 (1 Credit CTE) (CRJ107UC) CTE Cyber Security 200 CSS200 (2 Credits CTE) (CRJ333UC) Cyber Security CTE Integrated CTE300 (1 Credit) CTE Cyber Security 300 CSS300 (2 Credits CTE) (CRJ335UC) Cyber Security CTE Integrated ELA CTE400 (1 Credit) DISTRICT REQUIREMENTS Students must pass CTE Cyber Security 100, 200 and 300 to challenge the course approved technical assessment. All students in 9th grade will receive and Financial Management and CTE Exploratory classes. Student will have earned the 11th grade integrated science credit upon successful completion of the CTE Cybersecurity 100 and 200. Student will have earned the 12th grade integrated ELA credit upon successful completion of the CTE Cybersecurity 100, 200 and 300. Student will receive the CTE Endorsement upon successful completion of the CTE Cybersecurity Program and must pass the prescribed technical assessment and complete a commencement level project. 60
COURSE DESCRIPTION This course provides an overview and exploration of software and technology foundations for cybersecurity. The course emphasizes practical hands-on labs and exercises that will be used by students to gain an understanding of software technologies that are relevant to cybersecurity. By writing lab reports that document their findings and results, students will implement knowledge and skills in authentic situations. COURSE OBJECTIVES 1. Students will know and understand computers and how they relate to cybersecurity. 2. Students will understand the historical and societal context of cybersecurity. 3. Students will understand the basics of computer system and network fundamentals. 4. Students will understand the basics of computer math and computer number systems. 5. Students will be able to troubleshoot and diagnose computers. 6. Students will understand the relation between the physical and virtual worlds. INTEGRATED ACADEMICS 1 Credit (CTE 300) Course Syllabus Cyber Security 200 EQUIPMENT AND SUPPLIES School will provide: All necessary lab and classroom equipment. Student will provide: N/A TEXTBOOK TBD GRADING 10% Class attendance/ Participation 10% Oral Presentation 25% Assignments 25% Mid-Term Exam 30% Final Exam All work is due at the time and day specified when the assignment is given. Submission details for work to be graded will be given at the time the work is assigned. Quizzes will be given throughout the semester. The lowest quiz score (one score only) will be dropped when calculating the final course grade. ADDITIONAL COURSE POLICIES Students are required to follow all safety procedures. CYBER SECURITY Course Calendar Cyber Security 200 QUARTER UNITS OF STUDY 1 Course Introduction Computer System and Network Fundamentals Computer and Computer Number Systems Virtual Machines: VMware, VirtualBox, Kali Linux Command Line Interface: Windows 2 Command Line Interface: Linux File System Management Open-Source Software Management Host-Based Security Tools Network-Based Security Tools 3 Penetration Testing Reconnaissance Scanning 4 Exploitation Social Engineering Web-Based-Exploration Post-Exploitation and Maintaining Access Penetration Testing Wrap-Up Review and Final Exam 61
Time Frame WEEK 1-2 Course Introduction Computer System and Network Fundamentals What knowledge and skills are developed in this course? What is a computer system and how does it relate to a network? Configure a computer system and its software Explain how a computer is attached to the network Define and explain the IoT (Internet of Things) Syllabus Assignment #1 Related s 1,2,3,4,8,9 IT 1,2,3,4 1,2,3,5 IT-NET 1,2,3,4,5 IT-PRG 3,7,9 CCLS,, RST.11-12.1,2,3,4 WEEK 3-6 Computer and Computer Number Systems How do computers store data? How are numbers converted between binary and decimal systems? Describe how computers store data Explain decimal, binary, octal, and hexadecimal number systems Perform binary addition Convert numbers from binary to decimal and decimal to binary forms Assignment #2: Computer and Computer Number Systems Test 2,4,8,11, 12 IT 12 6,9 RST.11-12.1,2,3,4 Week 7-8 Virtual Machines: VMware, VirtualBox, Kali Linux What is a virtual machine? How is a virtual machine implemented? Define a virtual machine and describe its function Set up and maintain a virtual machine Compare and contrast different virtualization software Install Windows and Kali VM software Assignment #3: Virtual Machines Quiz 2,7,8,11 IT 4,5,7,12 1,2,4,7,8,9 IT-NET 3,4 IT-PRG 1,3,7,9
Time Frame WEEK 9-10 Command Line Interface: Windows What is the Windows Command line (CMD)? What are the advantages of the Command line? Explain and use basic Windows commands Navigate through a Windows system via CMD Assignment #4 Related 2,4,11,12 IT 1 1,2,6 CCLS,, CYBER SECURITY WEEK 11-12 Command Line Interface: Linux What is the Linux Terminal? What are the advantages of the Terminal? Explain and use basic Linux commands Navigate through a Linux system via Terminal Assignment #5 2,4,11 IT 12 1,2,6 WEEK 13-15 File System Management Open-Source Software Management What are the different file system structures? What is open source software? Compare and contrast different file types Explain how files are saved using different file systems including Fat32, NTFS and EXT Use different file systems to manage files Describe open source software and its uses Assignment #6 2,4,7,8,11 IT 7,9 2,4,9,10 IT-NET 1 63
Time Frame WEEK 16-18 Host-Based Security Tools How can security measures be implemented on a computer? Describe host-based security tools including antivirus software and firewalls Use host-based security tools to improve computer security Assignment #7 Quiz CTE 2,3,4,5,7, 8,9,11,12 5,6,9,8 CCLS,, WEEK 19-20 Network-Based Security Tools What are some different networkbased security tools? How are network security tools implemented on a system? Describe networkbased security tools including intrusion detection and prevention systems Explain the function of Network Access Controls and DMZ (demilitarized zone) in computer security Assignment #8 Quiz 2,4,7,8,11, 12 5,6,9,8 IT-NET 1,4,5 2,4,7,8,11, 12 64
Time Frame WEEK 21-24 Penetration Testing What is penetration testing? What are the benefits of conducting a penetration test? Describe penetration testing tools Use penetration testing to find vulnerabilities in a computer system Assignment #9 Related 1,2,4,5,7, 8,9,11 2,5,6,9,10 IT-NET 1,4,5 CCLS,, CYBER SECURITY WEEK 25-28 Reconnaissance How can outsiders obtain information about a computer system? Define reconnaissance Explain the connection between reconnaissance and control panel Explain the connection between reconnaissance and computer systems information Assignment #10 2,4,7,11 IT 9,10 5,6 2,4,7,11 WHST.11-12. WEEK 29-30 Scanning What is the purpose of doing a port scan? What information does a port scan reveal? Define open ports in a computer system Check for open ports in a computer system using the Command line Assignment #11 1,2,7,8,11 5,6 65
Time Frame WEEK 31-33 Exploitation How can a computer system be exploited? Define exploitation of a computer system Gain access into a computer system Assignment #12 CTE 1,2,3,5,7, 8,9,11,12,10 5,6 CCLS,, WEEK 34-36 Social Engineering Web-Based Exploitation How can someone use social engineering to exploit a computer user? Define social engineering and explain methods for preventing it Compare and contrast exploitation and social engineering Assignment #13 1,2,3,5,7, 8,9,11,12 IT 4,5,8,9,10 5,6 66
Time Frame WEEK 37-39 Post Exploitation and Maintaining Access Penetration Testing Wrap-Up What is a backdoor and how is it used to access computer information? Explain how access into a system is maintained after exploitation Describe and use Backdoor Trojan software Assignment #14 Related 1,2,3,5,7, 8,9,11,12 1,2,3,4,9, 10 IT-NET 1,5 IT-PRG 3 CCLS,, CYBER SECURITY WEEK 40 Review and Final Examination How can the knowledge and skills learned in this course be applied? Apply knowledge and skills to solve problems Assignment #15 Final Examination 1,2,4,5,6, 10,12 IT 1-12 9 67