The full curriculum
Two flagship tracks. 41 classroom-tested modules.
Blackbox CLC ships a complete CTE pathway: a year of cybersecurity plus a standalone semester of AI fluency. Every module includes a teacher guide, student worksheet, scenarios or activity packet, quiz, and answer key. Built by an OSCP-certified instructor who teaches this material every week.
The pathway
Cyber I → Cyber II → AI Fluency
Schools can run the cyber track as a year-long CTE program, drop in AI Fluency as a standalone semester, or combine all three for a flagship two-year program.
Cybersecurity I
Foundations: ethics, accounts, phishing, network basics, incident response.
10 modules · 2400 min total
Cybersecurity II
Defender depth: triage, hardening, IR drills, careers and certifications.
15 modules · 4800 min total
AI Fluency
How LLMs work, prompting, frontier and local models, RAG and agents, multimodal AI, risks, capstone.
10 modules · 1920 min total
Semester 1
Cybersecurity I
Foundations: ethics, accounts, phishing, network basics, incident response.
| # | Module | Difficulty | Length | View |
|---|---|---|---|---|
| 1 | Cybersecurity I, Unit 1: Orientation and Professional Ethics Open the course with the line every student must internalize before they touch a tool: tools are not toys, permission matters, and 'I was just testing it' is not a legal defense. | foundational | 180 min | Detail → |
| 2 | Cybersecurity I, Unit 2: Security Fundamentals Install the mental scaffolding the rest of the course rests on: CIA, AAA, least privilege, defense in depth, and the difference between threat, vulnerability, and risk. | foundational | 180 min | Detail → |
| 3 | Cybersecurity I, Unit 3: Hardware, Operating Systems, and Virtualization Build the lab. Students leave this unit with a working virtual cyber range — Kali + a Windows target + a Linux target — and the muscle memory to snapshot, break, and roll back. | foundational | 240 min | Detail → |
| 4 | Cybersecurity I, Unit 4: Networking Fundamentals From 'wifi just works' to seeing the actual packets. Students leave this unit able to read a network diagram, run ping/traceroute/nslookup, and walk a Wireshark capture line by line. | foundational | 240 min | Detail → |
| 5 | Cybersecurity I, Unit 5: Cyber Threats and Attack Vectors Name the threat. Trace the attack. Students leave able to identify malware families, dissect a phishing email, recognize social engineering plays, and profile a threat actor. | foundational | 240 min | Detail → |
| 6 | Cybersecurity I, Unit 6: Cryptography and Data Protection Hashing, symmetric, asymmetric, signatures, certificates, and TLS — taught at the level a defender actually needs. No math degree required. | foundational | 240 min | Detail → |
| 7 | Cybersecurity I, Unit 7: Defensive Security Basics Hardening 101. Students harden a real Windows VM and a real Linux VM, audit accounts, configure a host firewall, and walk away with a defender's mindset. | foundational | 240 min | Detail → |
| 8 | Cybersecurity I, Unit 8: Introduction to Ethical Hacking The ethical hacking methodology, end-to-end, on a closed lab range. Students do their first reconnaissance, scan, enumeration, vulnerability identification, and write-up — all under written authorization. | foundational | 240 min | Detail → |
| 9 | Cybersecurity I, Unit 9: Web, Cloud, IoT, and Emerging Technology Security How the modern attack surface actually looks: HTTP/HTTPS internals, cloud shared responsibility, IoT realities, mobile risk, and an honest first look at AI security. | foundational | 240 min | Detail → |
| 10 | Cybersecurity I, Unit 10: Capstone and EHE Credential Preparation The closer. Students assemble a portfolio, pick a capstone path, and prepare for the EC-Council Ethical Hacking Essentials credential. Plus a comprehensive review across all 9 prior units. | foundational | 360 min | Detail → |
Semester 2
Cybersecurity II
Defender depth: triage, hardening, IR drills, careers and certifications.
| # | Module | Difficulty | Length | View |
|---|---|---|---|---|
| 1 | Cybersecurity II, Unit 1: Cyber I Review and Advanced Lab Orientation Reset the lab. Re-establish the rules. Diagnose where the class is in fact and where the class thinks it is. Ship out of Day 1 with a working, segmented, validated cyber range. | intermediate | 240 min | Detail → |
| 2 | Cybersecurity II, Unit 2: Advanced Networking and Network Defense VLANs, segmentation, NAT, firewall rule design, IDS/IPS concepts, VPN, and zero trust at the level a defender actually uses. Students design and defend a segmented network. | intermediate | 300 min | Detail → |
| 3 | Cybersecurity II, Unit 3: Linux and Windows Administration for Cybersecurity From command-line literacy to administrator-grade fluency. Bash, PowerShell, services, scheduled tasks, logs, and the privilege boundary. | intermediate | 300 min | Detail → |
| 4 | Cybersecurity II, Unit 4: Reconnaissance and Open-Source Intelligence Build a complete OSINT picture of a fictional company without ever sending them a packet. Then validate your sources, document your methodology, and respect the line. | intermediate | 240 min | Detail → |
| 5 | Cybersecurity II, Unit 5: Scanning, Enumeration, and Vulnerability Assessment From recon to a defensible list of weaknesses with severity, evidence, and proof. Nmap, Nessus/OpenVAS, banner grabbing, service enumeration, and the discipline of validating every finding. | intermediate | 360 min | Detail → |
| 6 | Cybersecurity II, Unit 6: Ethical Exploitation Concepts Where the ethics meet the keyboard. Authorized exploitation in the lab range only: Metasploit basics, password attacks against teacher-issued hash sets, post-exploitation concepts, and the discipline of stopping at proof-of-concept. | advanced | 360 min | Detail → |
| 7 | Cybersecurity II, Unit 7: Web Application Security OWASP Top 10 deep dive with Burp Suite Community and OWASP Juice Shop. Students recognize, demonstrate, and remediate the top web vulnerabilities under signed RoE. | advanced | 360 min | Detail → |
| 8 | Cybersecurity II, Unit 8: SOC Fundamentals Live in the SOC chair. Triage alerts in a SIEM, write the ticket, hand it off, and learn the rhythm of a 24/7 operation. | intermediate | 360 min | Detail → |
| 9 | Cybersecurity II, Unit 9: Incident Response and Digital Forensics Basics When the alert is real. The IR lifecycle, evidence handling, memory and disk forensics fundamentals, and chain of custody. | advanced | 360 min | Detail → |
| 10 | Cybersecurity II, Unit 10: Malware, Social Engineering, and Defensive Awareness Static analysis basics, dynamic analysis in a sandbox, and a deep dive on social engineering at the level needed to design awareness programs that actually work. | advanced | 300 min | Detail → |
| 11 | Cybersecurity II, Unit 11: Cloud, Wireless, Mobile, and IoT Security Beyond the data center perimeter: cloud shared responsibility done concretely (AWS / Azure / GCP), Wi-Fi attack categories, mobile threat models, and the IoT/OT realities that bite in 2025. | intermediate | 300 min | Detail → |
| 12 | Cybersecurity II, Unit 12: Risk Management, Governance, and Compliance The skill that decides who runs the program. Risk math, frameworks (NIST CSF, ISO 27001, CIS), and the regulations students will actually meet at work (HIPAA, PCI DSS, SOC 2, FERPA, GDPR/CCPA). | intermediate | 240 min | Detail → |
| 13 | Cybersecurity II, Unit 13: Pen Test Reporting and Professional Communication The work product clients pay for. Executive summaries, technical findings, evidence, remediation, debriefs, and the soft skills that determine whether you're rehired. | advanced | 240 min | Detail → |
| 14 | Cybersecurity II, Unit 14: Career Readiness and Work-Based Learning Resume, LinkedIn, GitHub, certs, mock interviews, internship pipeline. The unit that turns a high-school cyber program into a hireable young professional. | intermediate | 240 min | Detail → |
| 15 | Cybersecurity II, Unit 15: Capstone Project The deliverable that ends the program. Pick one of four capstones (Red/Blue, SOC Investigation, Secure Enterprise Build, Pro Portfolio), present to a panel, and walk out hireable. | advanced | 600 min | Detail → |
Standalone semester
AI Fluency
How LLMs work, prompting, frontier and local models, RAG and agents, multimodal AI, risks, capstone.
| # | Module | Difficulty | Length | View |
|---|---|---|---|---|
| 1 | AI Fluency, Unit 1: Orientation — How to Use AI Without Getting Owned by It Open the AI course with the line every student must internalize before they ever paste a prompt: AI is a power tool, not an oracle. Cover what AI is, what it isn't, the school's AI policy, and the difference between AI assistance and AI plagiarism. | foundational | 180 min | Detail → |
| 2 | AI Fluency, Unit 2: How LLMs Actually Work Crack open the box. Tokens, embeddings, attention, training vs. inference, context windows, and why the model hallucinates — explained at a level a 10th grader can teach back. | foundational | 180 min | Detail → |
| 3 | AI Fluency, Unit 3: Prompt Engineering Fundamentals The single highest-leverage skill in AI work. Students learn the C.R.I.S.P. prompt frame, system vs. user roles, zero-shot vs. few-shot, format control, and the iteration loop that separates 'AI is mid' from 'AI is incredible.' | foundational | 180 min | Detail → |
| 4 | AI Fluency, Unit 4: Advanced Prompting — Chain-of-Thought, Personas, and Self-Critique Past the fundamentals, into the techniques pros use daily: chain-of-thought, ReAct, role-play, self-critique loops, prompt chaining, and the personal prompt library habit that compounds over time. | intermediate | 180 min | Detail → |
| 5 | AI Fluency, Unit 5: The Big LLMs — Comparing Frontier Models Hands-on tour of the frontier: GPT, Claude, Gemini, and the open-weight challengers. Students compare strengths, context windows, pricing, safety behavior, and learn to pick the right model for the job instead of defaulting to whatever app they opened first. | intermediate | 180 min | Detail → |
| 6 | AI Fluency, Unit 6: Local & Open-Source LLMs — Run Your Own AI Stop being a user. Become an operator. Install Ollama or LM Studio, download Llama / Mistral / Qwen / Phi, and run a real LLM on a laptop with the wifi turned off. The unit that changes how students think about AI. | intermediate | 240 min | Detail → |
| 7 | AI Fluency, Unit 7: Retrieval, Tools, and Agents From chatbot to product. RAG (retrieval-augmented generation) so the model has actual sources, function calling and MCP so the model can use tools, and agents that loop. Plus the honest conversation about when agents go off the rails. | intermediate | 180 min | Detail → |
| 8 | AI Fluency, Unit 8: Multimodal AI — Vision, Voice, Image, Video AI that sees, hears, draws, sings, and lies. Image generation, voice cloning, video synthesis, deepfakes, and the cryptographic fight back: C2PA, watermarking, and provenance. The unit parents most want students to take. | intermediate | 180 min | Detail → |
| 9 | AI Fluency, Unit 9: AI Risks — Hallucination, Bias, Privacy, and Prompt Injection The risks unit. Hallucination as a systemic feature, bias as a measurable property, privacy in the prompt era, and the security side: prompt injection, jailbreaks, data exfiltration, and model supply chain. Honest, calibrated, no doom and no hype. | intermediate | 180 min | Detail → |
| 10 | AI Fluency, Unit 10: Capstone — Build a Useful AI Tool Put it all together. Each student ships a working AI tool that solves a real problem in their life: a local-LLM study buddy, a prompt-library product, a RAG over their notes, or an image-gen workflow. Disclose, verify, contribute — graded for real. | applied | 240 min | Detail → |
Bring it to your school
Single teacher, school, or district.
Buy a single edition for one teacher, license the whole catalog for your school, or contract a multi-school district rollout with onboarding and teacher workshops.
