Course Taught By : Mrs. Franco
Designed for 11 to 12 grades. Prerequisite: AP CSP
Exam Information: College Board Link
This course is structured around five major units that guide students from foundational security concepts to advanced defense strategies. Using the Paradigm Cyber curriculum, students engage in hands-on labs, cyber range simulations, and real-world scenarios to master the material.
Unit 1: Introduction to Security
Focus: The Cybersecurity Mindset & Risk
Students begin by exploring the fundamental concepts of risk, threats, and vulnerabilities. They learn to identify assets (what needs protecting) and analyze the potential impact of attacks. This unit establishes the "security-first" mindset, covering the CIA Triad (Confidentiality, Integrity, Availability) and the basics of risk management for individuals and organizations.
Unit 2: Securing Spaces
Focus: Physical Security & Social Engineering
Cybersecurity isn't just digital—it’s physical. In this unit, students analyze how to protect physical environments (server rooms, buildings, workspaces) using controls like badges, cameras, and locks. They also study social engineering tactics (phishing, tailgating) to understand how human error allows attackers to bypass physical and digital defenses.
Unit 3: Securing Networks
Focus: Network Defense & Traffic Analysis
Students dive into the architecture of the internet and local networks. They learn how to secure data in transit by configuring firewalls, utilizing Intrusion Detection Systems (IDS), and analyzing network logs to spot anomalies. Labs often involve using tools like Wireshark to inspect packet traffic and identify attacks like Denial of Service (DoS).
Unit 4: Securing Devices
Focus: Endpoint Protection & System Administration
This unit focuses on hardening the devices we use every day—laptops, servers, and mobile phones. Students learn Linux command line skills to manage system permissions, identify malware, and implement access controls. Topics include operating system security, patch management, and securing "Internet of Things" (IoT) devices.
Unit 5: Securing Applications and Data
Focus: Software Vulnerabilities & Cryptography
The final unit covers protecting the software and data itself. Students explore cryptography (encryption, hashing) to secure sensitive information. They also analyze common software vulnerabilities like SQL Injection and Cross-Site Scripting (XSS), using Python and secure coding practices to identify and mitigate flaws in applications.