Computer Science Foundations Syllabus Quarter 4

Week

Lesson Focus

Weekly Objectives

TN Standards

Assessments

Additional Notes

1

The Need for Cybersecurity

  • Explain the characteristics and value of personal data.
  • Define personal data.
  • Explain why personal data is profitable to hackers.

     

  • Explain the characteristics and value of data within an organization.
  • Describe types of data used by governments and organizations.
  • Describe the impact of a security breach.

 

Cybersecurity 24, 25, 26

  • Observation
  • Simulation
  • Hands on
  • Rubric

Cisco Networking Academy

 

 

2

 

 

 

 

The Need for Cybersecurity

 

  • Explain the characteristics and motives of cyber attackers and the legal and ethical issues for cybersecurity professionals.
  • Describe the characteristics and motives of an attacker.
  • Explain the characteristics and purpose of cyberwarfare.
  • Describe cyberwarfare.

 

Cybersecurity 24, 25, 26

  • Observation
  • Packet Tracer
  • Rubric

 

3

Attacks, Concepts and Techniques

  • Explain the characteristics and operation of a cyber attack.
  • Explain how a security vulnerability is exploited.
  • Identify examples of security vulnerabilities.
  • Describe types of malware and their symptoms.

 

Cybersecurity 24, 25, 26

  • Observation
  • Lab
  • Rubric

 

4

Attacks, Concepts and Techniques

  • Describe methods of infiltration.
  • Describe methods used to deny service.
  • Explain trends in the cyberthreat landscape.
  • Describe a blended attack.
  • Describe the importance of impact reduction.

Cybersecurity 24, 25, 26

  • Observation
  • Create a
  • Presentation
  • Rubric

N/A

5

Protecting Your Data and Privacy

  • Explain how to protect devices from threats.
  • Explain how to protect your devices and network.
  • Describe safe procedures for data maintenance.

 

 

Cybersecurity 24, 25, 26

  • Observation
  • Hands on
  • Chapter exercises
  • Rubric

None

 

6

Protecting Your Data and Privacy

  • Explain how to safeguard your privacy.
  • Describe strong authentication methods.
  • Describe safe online behaviors

Cybersecurity 24, 25, 26

  • Observation
  • Hands on
  • Chapter exercises

Rubric

Cisco Networking Academy

 

7

Protecting the Organization

  • Explain techniques to protect organizations from cyber attacks.
  • Describe the various types of firewalls.
  • Describe different types of security appliances.
  • Describe different methods of detecting attacks in real time.
  • Describe methods of detecting malware.

 

Cybersecurity 24, 25, 26

  • Observation
  • Hands on
  • Chapter exercises

Rubric

None

8

Protecting the Organization

  • Describe security best practices for organizations.
  • Explain the behavior-based approach to cybersecurity.
  • Define the term botnet.
  • Define the term kill chain.
  • Define behavior-based security.

Explain how NetFlow helps to defend against cyberattacks

Cybersecurity 24, 25, 26

  • Observation
  • Hand on activities
  • Chapter exercises
  • Rubric

None

9

Cybersecurity Education and Careers

  • Explain the legal and ethical issues facing cybersecurity professionals
  • Describe the legal and ethical issues facing a cybersecurity professional

Career Exploration 7

  • Observation
  • Lab
  • Rubric

Cisco Networking Academy