Blackbox Intelligence Group

The full curriculum

Two flagship tracks. 41 classroom-tested modules.

Blackbox CLC ships a complete CTE pathway: a year of cybersecurity plus a standalone semester of AI fluency. Every module includes a teacher guide, student worksheet, scenarios or activity packet, quiz, and answer key. Built by an OSCP-certified instructor who teaches this material every week.

The pathway

Cyber I → Cyber II → AI Fluency

Schools can run the cyber track as a year-long CTE program, drop in AI Fluency as a standalone semester, or combine all three for a flagship two-year program.

Semester 1

Cybersecurity I

Foundations: ethics, accounts, phishing, network basics, incident response.

10 modules · 2400 min total

Semester 2

Cybersecurity II

Defender depth: triage, hardening, IR drills, careers and certifications.

15 modules · 4800 min total

Standalone semester

AI Fluency

How LLMs work, prompting, frontier and local models, RAG and agents, multimodal AI, risks, capstone.

10 modules · 1920 min total

Semester 1

Cybersecurity I

Foundations: ethics, accounts, phishing, network basics, incident response.

#ModuleView
1Cybersecurity I, Unit 1: Orientation and Professional Ethics

Open the course with the line every student must internalize before they touch a tool: tools are not toys, permission matters, and 'I was just testing it' is not a legal defense.

Detail →
2Cybersecurity I, Unit 2: Security Fundamentals

Install the mental scaffolding the rest of the course rests on: CIA, AAA, least privilege, defense in depth, and the difference between threat, vulnerability, and risk.

Detail →
3Cybersecurity I, Unit 3: Hardware, Operating Systems, and Virtualization

Build the lab. Students leave this unit with a working virtual cyber range — Kali + a Windows target + a Linux target — and the muscle memory to snapshot, break, and roll back.

Detail →
4Cybersecurity I, Unit 4: Networking Fundamentals

From 'wifi just works' to seeing the actual packets. Students leave this unit able to read a network diagram, run ping/traceroute/nslookup, and walk a Wireshark capture line by line.

Detail →
5Cybersecurity I, Unit 5: Cyber Threats and Attack Vectors

Name the threat. Trace the attack. Students leave able to identify malware families, dissect a phishing email, recognize social engineering plays, and profile a threat actor.

Detail →
6Cybersecurity I, Unit 6: Cryptography and Data Protection

Hashing, symmetric, asymmetric, signatures, certificates, and TLS — taught at the level a defender actually needs. No math degree required.

Detail →
7Cybersecurity I, Unit 7: Defensive Security Basics

Hardening 101. Students harden a real Windows VM and a real Linux VM, audit accounts, configure a host firewall, and walk away with a defender's mindset.

Detail →
8Cybersecurity I, Unit 8: Introduction to Ethical Hacking

The ethical hacking methodology, end-to-end, on a closed lab range. Students do their first reconnaissance, scan, enumeration, vulnerability identification, and write-up — all under written authorization.

Detail →
9Cybersecurity I, Unit 9: Web, Cloud, IoT, and Emerging Technology Security

How the modern attack surface actually looks: HTTP/HTTPS internals, cloud shared responsibility, IoT realities, mobile risk, and an honest first look at AI security.

Detail →
10Cybersecurity I, Unit 10: Capstone and EHE Credential Preparation

The closer. Students assemble a portfolio, pick a capstone path, and prepare for the EC-Council Ethical Hacking Essentials credential. Plus a comprehensive review across all 9 prior units.

Detail →

Semester 2

Cybersecurity II

Defender depth: triage, hardening, IR drills, careers and certifications.

#ModuleView
1Cybersecurity II, Unit 1: Cyber I Review and Advanced Lab Orientation

Reset the lab. Re-establish the rules. Diagnose where the class is in fact and where the class thinks it is. Ship out of Day 1 with a working, segmented, validated cyber range.

Detail →
2Cybersecurity II, Unit 2: Advanced Networking and Network Defense

VLANs, segmentation, NAT, firewall rule design, IDS/IPS concepts, VPN, and zero trust at the level a defender actually uses. Students design and defend a segmented network.

Detail →
3Cybersecurity II, Unit 3: Linux and Windows Administration for Cybersecurity

From command-line literacy to administrator-grade fluency. Bash, PowerShell, services, scheduled tasks, logs, and the privilege boundary.

Detail →
4Cybersecurity II, Unit 4: Reconnaissance and Open-Source Intelligence

Build a complete OSINT picture of a fictional company without ever sending them a packet. Then validate your sources, document your methodology, and respect the line.

Detail →
5Cybersecurity II, Unit 5: Scanning, Enumeration, and Vulnerability Assessment

From recon to a defensible list of weaknesses with severity, evidence, and proof. Nmap, Nessus/OpenVAS, banner grabbing, service enumeration, and the discipline of validating every finding.

Detail →
6Cybersecurity II, Unit 6: Ethical Exploitation Concepts

Where the ethics meet the keyboard. Authorized exploitation in the lab range only: Metasploit basics, password attacks against teacher-issued hash sets, post-exploitation concepts, and the discipline of stopping at proof-of-concept.

Detail →
7Cybersecurity II, Unit 7: Web Application Security

OWASP Top 10 deep dive with Burp Suite Community and OWASP Juice Shop. Students recognize, demonstrate, and remediate the top web vulnerabilities under signed RoE.

Detail →
8Cybersecurity II, Unit 8: SOC Fundamentals

Live in the SOC chair. Triage alerts in a SIEM, write the ticket, hand it off, and learn the rhythm of a 24/7 operation.

Detail →
9Cybersecurity II, Unit 9: Incident Response and Digital Forensics Basics

When the alert is real. The IR lifecycle, evidence handling, memory and disk forensics fundamentals, and chain of custody.

Detail →
10Cybersecurity II, Unit 10: Malware, Social Engineering, and Defensive Awareness

Static analysis basics, dynamic analysis in a sandbox, and a deep dive on social engineering at the level needed to design awareness programs that actually work.

Detail →
11Cybersecurity II, Unit 11: Cloud, Wireless, Mobile, and IoT Security

Beyond the data center perimeter: cloud shared responsibility done concretely (AWS / Azure / GCP), Wi-Fi attack categories, mobile threat models, and the IoT/OT realities that bite in 2025.

Detail →
12Cybersecurity II, Unit 12: Risk Management, Governance, and Compliance

The skill that decides who runs the program. Risk math, frameworks (NIST CSF, ISO 27001, CIS), and the regulations students will actually meet at work (HIPAA, PCI DSS, SOC 2, FERPA, GDPR/CCPA).

Detail →
13Cybersecurity II, Unit 13: Pen Test Reporting and Professional Communication

The work product clients pay for. Executive summaries, technical findings, evidence, remediation, debriefs, and the soft skills that determine whether you're rehired.

Detail →
14Cybersecurity II, Unit 14: Career Readiness and Work-Based Learning

Resume, LinkedIn, GitHub, certs, mock interviews, internship pipeline. The unit that turns a high-school cyber program into a hireable young professional.

Detail →
15Cybersecurity II, Unit 15: Capstone Project

The deliverable that ends the program. Pick one of four capstones (Red/Blue, SOC Investigation, Secure Enterprise Build, Pro Portfolio), present to a panel, and walk out hireable.

Detail →

Standalone semester

AI Fluency

How LLMs work, prompting, frontier and local models, RAG and agents, multimodal AI, risks, capstone.

#ModuleView
1AI Fluency, Unit 1: Orientation — How to Use AI Without Getting Owned by It

Open the AI course with the line every student must internalize before they ever paste a prompt: AI is a power tool, not an oracle. Cover what AI is, what it isn't, the school's AI policy, and the difference between AI assistance and AI plagiarism.

Detail →
2AI Fluency, Unit 2: How LLMs Actually Work

Crack open the box. Tokens, embeddings, attention, training vs. inference, context windows, and why the model hallucinates — explained at a level a 10th grader can teach back.

Detail →
3AI Fluency, Unit 3: Prompt Engineering Fundamentals

The single highest-leverage skill in AI work. Students learn the C.R.I.S.P. prompt frame, system vs. user roles, zero-shot vs. few-shot, format control, and the iteration loop that separates 'AI is mid' from 'AI is incredible.'

Detail →
4AI Fluency, Unit 4: Advanced Prompting — Chain-of-Thought, Personas, and Self-Critique

Past the fundamentals, into the techniques pros use daily: chain-of-thought, ReAct, role-play, self-critique loops, prompt chaining, and the personal prompt library habit that compounds over time.

Detail →
5AI Fluency, Unit 5: The Big LLMs — Comparing Frontier Models

Hands-on tour of the frontier: GPT, Claude, Gemini, and the open-weight challengers. Students compare strengths, context windows, pricing, safety behavior, and learn to pick the right model for the job instead of defaulting to whatever app they opened first.

Detail →
6AI Fluency, Unit 6: Local & Open-Source LLMs — Run Your Own AI

Stop being a user. Become an operator. Install Ollama or LM Studio, download Llama / Mistral / Qwen / Phi, and run a real LLM on a laptop with the wifi turned off. The unit that changes how students think about AI.

Detail →
7AI Fluency, Unit 7: Retrieval, Tools, and Agents

From chatbot to product. RAG (retrieval-augmented generation) so the model has actual sources, function calling and MCP so the model can use tools, and agents that loop. Plus the honest conversation about when agents go off the rails.

Detail →
8AI Fluency, Unit 8: Multimodal AI — Vision, Voice, Image, Video

AI that sees, hears, draws, sings, and lies. Image generation, voice cloning, video synthesis, deepfakes, and the cryptographic fight back: C2PA, watermarking, and provenance. The unit parents most want students to take.

Detail →
9AI Fluency, Unit 9: AI Risks — Hallucination, Bias, Privacy, and Prompt Injection

The risks unit. Hallucination as a systemic feature, bias as a measurable property, privacy in the prompt era, and the security side: prompt injection, jailbreaks, data exfiltration, and model supply chain. Honest, calibrated, no doom and no hype.

Detail →
10AI Fluency, Unit 10: Capstone — Build a Useful AI Tool

Put it all together. Each student ships a working AI tool that solves a real problem in their life: a local-LLM study buddy, a prompt-library product, a RAG over their notes, or an image-gen workflow. Disclose, verify, contribute — graded for real.

Detail →

Bring it to your school

Single teacher, school, or district.

Buy a single edition for one teacher, license the whole catalog for your school, or contract a multi-school district rollout with onboarding and teacher workshops.