• Secondary Education: Customizable Solution for Cybersecurity Programs

  • Valued Outcomes

    Our training is aligned to meet the needs of all stakeholders!

    1

    Students

    ~Access to high skilled, high wage, and high demand career

    ~Eligible for living wage after graduation

    ~Prepared for college, career, and military

    ~Connection to the world of work

    2

    Districts

    ~Four courses aligned with 5 TEA courses for maximum weighted funding

    ~IBC attainment

    ~CTE Completer

    ~HB3/CCMR/Accountability

    3

    Industry

    ~Engagement in the career training process

    ~Talent pool with the competencies needed for today and tomorrow

    ~Cyber trained individuals who have expandable knowledge, skills, and abilities

  • Program of Study Courses

    Course Descriptions in Progressive Order

    broken image

    Foundations of Information Technology

    In Principles of Information Technology, students will develop computer literacy skills to adapt to emerging technologies used in the global marketplace. Students will implement personal and interpersonal skills to prepare for a rapidly evolving workplace environment. Students will enhance reading, writing, computing, communication, and reasoning skills and apply them to the information technology environment.

    broken image

    Foundations of Cybersecurity

    In the Foundations of Cybersecurity course, students will develop the knowledge and skills needed to explore fundamental concepts related to the ethics, laws, and operations of cybersecurity. Students will examine trends and operations of cyberattacks, threats, and vulnerabilities. Students will review and explore security policies designed to mitigate risks. The skills obtained in this course prepare students for additional study in cybersecurity. A variety of courses are available to students interested in this field. Foundations of Cybersecurity may serve as an introductory course in this field of study. 

    broken image

    Critical Infrastructure and Inicident Response

    This course is two-in-one: Networking and Digital Forensics.

     

    In Networking, students will develop knowledge of the concepts and skills related to data networking technologies and practices to apply them to personal or career development. To prepare for success, students will have opportunities to reinforce, apply, and transfer knowledge and skills to a variety of settings and problems.

     

    Digital Forensics introduces students to the knowledge and skills of digital forensics. The course provides a survey of the field of digital forensics and incident response.  

    broken image

    Cybersecurity Capstone

    The Cybersecurity Capstone course is the culmination of the knowledge, skills, and abilities that learners have gained throughout the program of study. This final course reinforces the learning objectives and outcomes needed for success in a cyber career and on the CompTIA Security+ certification exam. The end of the course provides a simulated exercise where learners will apply their KSAs in a real-world environment.

  • Instructional Benefits

     

    Our curriculum is turn-key and hosted in the cloud. We understand the challenge to hire industry experts in CTE programs. To address this need, we have created a comprehensive packaging of our entire curriculum.

     

    All lesson objectives, lesson content, activities, slide decks, videos, assessments, and more are complete within each module.

     

    To support students' mastery of cyber skills, our virtual range provides access to a skills lab that offers simulated experiences.

     

    Also, the virtual machines in the cloud provide access to both Linux and Windows operating systems, reducing the need for students to have a computer lab with desktop computers.

     

    Our team of educators walk shoulder to shoulder with the cyber instructors to support the instructional process. We provide assistance with recruitment of students, marketing collaterals, pacing calendars, and much more!