Curriculum
Classroom-safe cybersecurity modules.
Each module includes a teacher overview, learning objectives, vocabulary, safety notes, warm-up, mini-lesson, student activity, rubric, answer key, and career connection. Module 1 is free to preview.
Module 1: Cyber Ethics & Authorized Use
Set the rules of the lab. Students sign a real safety agreement, learn the line between ethical and unauthorized use, and practice classifying real scenarios.
60 min · beginner
Preview module ->Module 2: Passwords, MFA, and Account Security
Identity is the most-attacked control in the modern stack. Students leave with a real account-security checklist they can apply tonight.
60 min · beginner
View summary ->Module 3: Phishing Investigation
Students dissect three real-style phishing emails, identify the indicators, and write the SOC ticket like a junior analyst would.
60 min · beginner
View summary ->Module 4: Networking Basics for Defenders
The defender's mental model of a network: IPs, ports, protocols, and packet captures, taught with diagrams and a guided walk-through.
60 min · beginner
View summary ->Module 5: Vulnerability Prioritization
Ten real-style vulnerability cards. Students learn that severity is not the whole story — exposure, exploitability, and asset value drive what gets fixed first.
60 min · beginner
View summary ->Module 6: Incident Response Tabletop Exercise
A three-turn tabletop simulation. Students role-play a school incident response team and decide what to do — and what to say to whom — during a live ransomware event.
60 min · intermediate
View summary ->Cybersecurity I, Unit 1: Orientation and Professional Ethics
Open the course with the line every student must internalize before they touch a tool: tools are not toys, permission matters, and 'I was just testing it' is not a legal defense.
180 min · foundational
Preview module ->Cybersecurity I, Unit 2: Security Fundamentals
Install the mental scaffolding the rest of the course rests on: CIA, AAA, least privilege, defense in depth, and the difference between threat, vulnerability, and risk.
180 min · foundational
View summary ->Cybersecurity I, Unit 3: Hardware, Operating Systems, and Virtualization
Build the lab. Students leave this unit with a working virtual cyber range — Kali + a Windows target + a Linux target — and the muscle memory to snapshot, break, and roll back.
240 min · foundational
View summary ->Cybersecurity I, Unit 4: Networking Fundamentals
From 'wifi just works' to seeing the actual packets. Students leave this unit able to read a network diagram, run ping/traceroute/nslookup, and walk a Wireshark capture line by line.
240 min · foundational
View summary ->Cybersecurity I, Unit 5: Cyber Threats and Attack Vectors
Name the threat. Trace the attack. Students leave able to identify malware families, dissect a phishing email, recognize social engineering plays, and profile a threat actor.
240 min · foundational
View summary ->Cybersecurity I, Unit 6: Cryptography and Data Protection
Hashing, symmetric, asymmetric, signatures, certificates, and TLS — taught at the level a defender actually needs. No math degree required.
240 min · foundational
View summary ->Cybersecurity I, Unit 7: Defensive Security Basics
Hardening 101. Students harden a real Windows VM and a real Linux VM, audit accounts, configure a host firewall, and walk away with a defender's mindset.
240 min · foundational
View summary ->Cybersecurity I, Unit 8: Introduction to Ethical Hacking
The ethical hacking methodology, end-to-end, on a closed lab range. Students do their first reconnaissance, scan, enumeration, vulnerability identification, and write-up — all under written authorization.
240 min · foundational
View summary ->Cybersecurity I, Unit 9: Web, Cloud, IoT, and Emerging Technology Security
How the modern attack surface actually looks: HTTP/HTTPS internals, cloud shared responsibility, IoT realities, mobile risk, and an honest first look at AI security.
240 min · foundational
View summary ->Cybersecurity I, Unit 10: Capstone and EHE Credential Preparation
The closer. Students assemble a portfolio, pick a capstone path, and prepare for the EC-Council Ethical Hacking Essentials credential. Plus a comprehensive review across all 9 prior units.
360 min · foundational
View summary ->Cybersecurity II, Unit 1: Cyber I Review and Advanced Lab Orientation
Reset the lab. Re-establish the rules. Diagnose where the class is in fact and where the class thinks it is. Ship out of Day 1 with a working, segmented, validated cyber range.
240 min · intermediate
View summary ->Cybersecurity II, Unit 2: Advanced Networking and Network Defense
VLANs, segmentation, NAT, firewall rule design, IDS/IPS concepts, VPN, and zero trust at the level a defender actually uses. Students design and defend a segmented network.
300 min · intermediate
View summary ->Cybersecurity II, Unit 3: Linux and Windows Administration for Cybersecurity
From command-line literacy to administrator-grade fluency. Bash, PowerShell, services, scheduled tasks, logs, and the privilege boundary.
300 min · intermediate
View summary ->Cybersecurity II, Unit 4: Reconnaissance and Open-Source Intelligence
Build a complete OSINT picture of a fictional company without ever sending them a packet. Then validate your sources, document your methodology, and respect the line.
240 min · intermediate
View summary ->Cybersecurity II, Unit 5: Scanning, Enumeration, and Vulnerability Assessment
From recon to a defensible list of weaknesses with severity, evidence, and proof. Nmap, Nessus/OpenVAS, banner grabbing, service enumeration, and the discipline of validating every finding.
360 min · intermediate
View summary ->Cybersecurity II, Unit 6: Ethical Exploitation Concepts
Where the ethics meet the keyboard. Authorized exploitation in the lab range only: Metasploit basics, password attacks against teacher-issued hash sets, post-exploitation concepts, and the discipline of stopping at proof-of-concept.
360 min · advanced
View summary ->Cybersecurity II, Unit 7: Web Application Security
OWASP Top 10 deep dive with Burp Suite Community and OWASP Juice Shop. Students recognize, demonstrate, and remediate the top web vulnerabilities under signed RoE.
360 min · advanced
View summary ->Cybersecurity II, Unit 8: SOC Fundamentals
Live in the SOC chair. Triage alerts in a SIEM, write the ticket, hand it off, and learn the rhythm of a 24/7 operation.
360 min · intermediate
View summary ->Cybersecurity II, Unit 9: Incident Response and Digital Forensics Basics
When the alert is real. The IR lifecycle, evidence handling, memory and disk forensics fundamentals, and chain of custody.
360 min · advanced
View summary ->Cybersecurity II, Unit 10: Malware, Social Engineering, and Defensive Awareness
Static analysis basics, dynamic analysis in a sandbox, and a deep dive on social engineering at the level needed to design awareness programs that actually work.
300 min · advanced
View summary ->Cybersecurity II, Unit 11: Cloud, Wireless, Mobile, and IoT Security
Beyond the data center perimeter: cloud shared responsibility done concretely (AWS / Azure / GCP), Wi-Fi attack categories, mobile threat models, and the IoT/OT realities that bite in 2025.
300 min · intermediate
View summary ->Cybersecurity II, Unit 12: Risk Management, Governance, and Compliance
The skill that decides who runs the program. Risk math, frameworks (NIST CSF, ISO 27001, CIS), and the regulations students will actually meet at work (HIPAA, PCI DSS, SOC 2, FERPA, GDPR/CCPA).
240 min · intermediate
View summary ->Cybersecurity II, Unit 13: Pen Test Reporting and Professional Communication
The work product clients pay for. Executive summaries, technical findings, evidence, remediation, debriefs, and the soft skills that determine whether you're rehired.
240 min · advanced
View summary ->Cybersecurity II, Unit 14: Career Readiness and Work-Based Learning
Resume, LinkedIn, GitHub, certs, mock interviews, internship pipeline. The unit that turns a high-school cyber program into a hireable young professional.
240 min · intermediate
View summary ->Cybersecurity II, Unit 15: Capstone Project
The deliverable that ends the program. Pick one of four capstones (Red/Blue, SOC Investigation, Secure Enterprise Build, Pro Portfolio), present to a panel, and walk out hireable.
600 min · advanced
View summary ->AI Fluency, Unit 1: Orientation — How to Use AI Without Getting Owned by It
Open the AI course with the line every student must internalize before they ever paste a prompt: AI is a power tool, not an oracle. Cover what AI is, what it isn't, the school's AI policy, and the difference between AI assistance and AI plagiarism.
180 min · foundational
Preview module ->AI Fluency, Unit 2: How LLMs Actually Work
Crack open the box. Tokens, embeddings, attention, training vs. inference, context windows, and why the model hallucinates — explained at a level a 10th grader can teach back.
180 min · foundational
View summary ->AI Fluency, Unit 3: Prompt Engineering Fundamentals
The single highest-leverage skill in AI work. Students learn the C.R.I.S.P. prompt frame, system vs. user roles, zero-shot vs. few-shot, format control, and the iteration loop that separates 'AI is mid' from 'AI is incredible.'
180 min · foundational
View summary ->AI Fluency, Unit 4: Advanced Prompting — Chain-of-Thought, Personas, and Self-Critique
Past the fundamentals, into the techniques pros use daily: chain-of-thought, ReAct, role-play, self-critique loops, prompt chaining, and the personal prompt library habit that compounds over time.
180 min · intermediate
View summary ->AI Fluency, Unit 5: The Big LLMs — Comparing Frontier Models
Hands-on tour of the frontier: GPT, Claude, Gemini, and the open-weight challengers. Students compare strengths, context windows, pricing, safety behavior, and learn to pick the right model for the job instead of defaulting to whatever app they opened first.
180 min · intermediate
View summary ->AI Fluency, Unit 6: Local & Open-Source LLMs — Run Your Own AI
Stop being a user. Become an operator. Install Ollama or LM Studio, download Llama / Mistral / Qwen / Phi, and run a real LLM on a laptop with the wifi turned off. The unit that changes how students think about AI.
240 min · intermediate
View summary ->AI Fluency, Unit 7: Retrieval, Tools, and Agents
From chatbot to product. RAG (retrieval-augmented generation) so the model has actual sources, function calling and MCP so the model can use tools, and agents that loop. Plus the honest conversation about when agents go off the rails.
180 min · intermediate
View summary ->AI Fluency, Unit 8: Multimodal AI — Vision, Voice, Image, Video
AI that sees, hears, draws, sings, and lies. Image generation, voice cloning, video synthesis, deepfakes, and the cryptographic fight back: C2PA, watermarking, and provenance. The unit parents most want students to take.
180 min · intermediate
View summary ->AI Fluency, Unit 9: AI Risks — Hallucination, Bias, Privacy, and Prompt Injection
The risks unit. Hallucination as a systemic feature, bias as a measurable property, privacy in the prompt era, and the security side: prompt injection, jailbreaks, data exfiltration, and model supply chain. Honest, calibrated, no doom and no hype.
180 min · intermediate
View summary ->AI Fluency, Unit 10: Capstone — Build a Useful AI Tool
Put it all together. Each student ships a working AI tool that solves a real problem in their life: a local-LLM study buddy, a prompt-library product, a RAG over their notes, or an image-gen workflow. Disclose, verify, contribute — graded for real.
240 min · applied
View summary ->