Cyber Security
The Cybersecurity Cluster introduces students to the vital and fast-growing field of digital security and information protection. In these courses, students learn how to safeguard computers, networks, and data from cyber threats while understanding the technologies that power our connected world. From ethical hacking and encryption to risk management and digital forensics, this cluster provides hands-on experiences that prepare students for college and in-demand careers in cybersecurity and information technology.Our computer Systems Networking and CISCO Academy class prepares students for exciting careers in IT and cybersecurity. Through hands-on learning, students explore how to safeguard them against cyber threats.
Course Progession
Computer Networking 1
- Introduction to Networks (ITN) Scope and Sequence
- Cybersecurity principles and best practices
Computer Networking 2
- Switching, Routing and wireless essentials
- Network setup, configuration, and troubleshooting
Computer Networking 3
- College Course and Credit: Cybersecurity fundamentals
- Identifying and preventing cyber attacks
- Ethical Hacking and penetration testing basics
Carrer Pathways
Security Analyst
- Network Monitoring: Using tools like Wireshark or Splunk to detect and respond to security threats.
- Risk Assessment: Identifying system vulnerabilities and recommending protection strategies.
- Incident Response: Investigating breaches, containing threats, and recovering compromised systems.
- Collaboration: Working with IT teams to ensure security policies and procedures are followed.
Ethical Hacker (Penetration Tester)
- Security Tools: Using Kali Linux, Metasploit, or Burp Suite for penetration testing and vulnerability scanning.
- Problem-Solving: Thinking creatively to simulate cyberattacks and improve system defenses.
- Ethics & Compliance: Following legal and professional standards when testing networks and applications.
CyberSecurity Engineer
- System Design: Building secure networks, firewalls, and intrusion detection systems.
- Encryption & Authentication: Implementing data protection methods to safeguard sensitive information.
- Threat Prevention: Developing and maintaining defense strategies against malware and cyberattacks.
- Collaboration: Partnering with developers and administrators to ensure security is integrated into all systems.