Course

Course Summary
Credit Type:
Course
ACE ID:
PLTW-0007
Location:
Classroom-based
Length:
36 weeks (1 hour per school day)
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Cybersecurity Essentials
Students must receive at least a 370 on the end-of-course assessment (equating to 70%) in order to receive credit.
Description

Objective:

The course objective is to introduce the tools and concepts of cybersecurity and encourage students to create solutions that allow people to share computing resources while protecting privacy. In this course, students solve problems by understanding and closing vulnerabilities. This course raises students’ knowledge of and commitment to ethical computing behavior. It also aims to develop students’ skills as consumers, friends, citizens, and employees who can effectively contribute to communities with a dependable cyber-infrastructure that moves and processes information safely.

Learning Outcomes:

  • Abide by professional, ethical, and legal standards when handling data or protecting data.
  • Recognize that a digital presence affects future success, both personally and professionally.
  • Analyze an algorithm used to encrypt or decrypt data and use encryption algorithms to secure information.
  • Gain understanding of how an operating system is structured and works by navigating the file system and modifying files, extensions, rights, and visibility to better protect data.
  • Analyze the evidence of web exploitations, both from front-end application and backend services perspective.
  • Describe career paths within the computing specialties.
  • Use digital forensics investigative techniques to solve a cybercrime.
  • Detect, analyze, and respond to the occurrence of a cybersecurity event or evidence of an attack. Identify user actions that strengthen the security of a networked system.
  • Find patterns and test hypotheses about digitally processed information to gain insight and knowledge.
  • Identify personal data sharing that places people at risk and evaluate risky personal data-sharing practices.
  • Select and apply tools with varying levels of abstraction within software, a computer, a network, and the internet.
  • Collaborate when processing information to gain insight and knowledge.
  • Access safely, manage safely, and attribute information using effective and secure strategies.
  • Analyze the impact of cybersecurity on our national security, infrastructure, economy, and public health.
  • Describe the modular components of a computer’s hardware and software and identify the components (software, hardware, protocols) that allow computers to network and communicate.
  • Monitor, analyze, and manage active processes on a computer or network of computers and Identify user actions that strengthen the security of information stored on a computer.
  • Perform ethical hacking to discover systems strengths and weaknesses.
  • Design the correct level of protection by implementing the appropriate safeguards.
  • Communicate ideas, processes, and products to optimize audience perception and understanding.

General Topics:

  • Career Readiness
  • Communication
  • Collaboration
  • Ethical Reasoning and Mindset
  • Critical and Creative Problem-Solving Process
  • Threat Investigation Analysis Response and Protection
  • Data
  • Impacts of Computing
  • Computational Tools and Techniques
  • Security Algorithms
  • Computer Systems and Networks
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Classroom Exercise
  • Computer Based Training
  • Discussion
  • Laboratory
  • Learner Presentations
  • Lectures
  • Practical Exercises
  • Project-based Instruction
  • Performance Rubrics (Checklists)

Methods of Assessment:

  • Examinations

Minimum Passing Score:

70%
Supplemental Materials

Other offerings from Project Lead The Way, Inc.

(PLTW-0005)
(PLTW-0002)
(PLTW-0003)