Coherent Cyber
Education
- …
Coherent Cyber
Education
- …
Secondary Education: Customizable Solution for Cybersecurity Programs
Valued Outcomes
Our training is aligned to meet the needs of all stakeholders!
1Students
~Access to high skilled, high wage, and high demand career
~Eligible for living wage after graduation
~Prepared for college, career, and military
~Connection to the world of work
2Districts
~Four courses aligned with 5 TEA courses for maximum weighted funding
~IBC attainment
~CTE Completer
~HB3/CCMR/Accountability
3Industry
~Engagement in the career training process
~Talent pool with the competencies needed for today and tomorrow
~Cyber trained individuals who have expandable knowledge, skills, and abilities
Program of Study Courses
Course Descriptions in Progressive Order
Foundations of Information Technology
In Principles of Information Technology, students will develop computer literacy skills to adapt to emerging technologies used in the global marketplace. Students will implement personal and interpersonal skills to prepare for a rapidly evolving workplace environment. Students will enhance reading, writing, computing, communication, and reasoning skills and apply them to the information technology environment.
Foundations of Cybersecurity
In the Foundations of Cybersecurity course, students will develop the knowledge and skills needed to explore fundamental concepts related to the ethics, laws, and operations of cybersecurity. Students will examine trends and operations of cyberattacks, threats, and vulnerabilities. Students will review and explore security policies designed to mitigate risks. The skills obtained in this course prepare students for additional study in cybersecurity. A variety of courses are available to students interested in this field. Foundations of Cybersecurity may serve as an introductory course in this field of study.
Critical Infrastructure and Inicident Response
This course is two-in-one: Networking and Digital Forensics.
In Networking, students will develop knowledge of the concepts and skills related to data networking technologies and practices to apply them to personal or career development. To prepare for success, students will have opportunities to reinforce, apply, and transfer knowledge and skills to a variety of settings and problems.
Digital Forensics introduces students to the knowledge and skills of digital forensics. The course provides a survey of the field of digital forensics and incident response.
Cybersecurity Capstone
The Cybersecurity Capstone course is the culmination of the knowledge, skills, and abilities that learners have gained throughout the program of study. This final course reinforces the learning objectives and outcomes needed for success in a cyber career and on the CompTIA Security+ certification exam. The end of the course provides a simulated exercise where learners will apply their KSAs in a real-world environment.
Instructional Benefits
Our curriculum is turn-key and hosted in the cloud. We understand the challenge to hire industry experts in CTE programs. To address this need, we have created a comprehensive packaging of our entire curriculum.
All lesson objectives, lesson content, activities, slide decks, videos, assessments, and more are complete within each module.
To support students' mastery of cyber skills, our virtual range provides access to a skills lab that offers simulated experiences.
Also, the virtual machines in the cloud provide access to both Linux and Windows operating systems, reducing the need for students to have a computer lab with desktop computers.
Our team of educators walk shoulder to shoulder with the cyber instructors to support the instructional process. We provide assistance with recruitment of students, marketing collaterals, pacing calendars, and much more!
Contact Us
214.813.1532
info@coherentcyber.education
Created With Strikingly.com