Cybersecurity - Newman Smith
Business & Industry Endorsement
This four year plan can be used as an example to help plan your high school career.
subject | 9th Grade | 10th Grade | 11th Grade | 12th grade |
---|---|---|---|---|
Language Arts | English | English | English | English |
Math | Math | Math | Math | Math |
Science | Science | Science | Science | Science |
Social Studies | Social Studies | Social Studies | Social Studies | Social Studies |
CTE Courses | Foundations of Cybersecurity (1 credit) |
Internetworking Technologies I (1 credit) |
Internetworking Technologies II |
Internetworking Technologies II OR Independent Study in Technology Applications (1 credit) |
Additional Elective | ||||
Additional Elective | ||||
Additional Elective |
Additional Graduation Requirements:
- Foreign Language (2 credits)
- Physical Education (1 credit)
- Fine Arts (1 credit)
- Health (1/2 credit)
Possible Industry Based Certifications:
- Oracle Certified Associate Java SE 8
- Cybersecurity Fundamentals
- CompTIA A+, Network+, Security+, and IT Fundamentals
occupations | median wage | annual openings | % growth |
---|---|---|---|
Information Security Analysts | $91,915 | 814 | 29% |
Network and Computer System Administrators | $82,597 | 2,814 | 19% |
Computer System Analysts | $87,568 | 5,937 | 29% |
The Cybersecurity program of study includes the occupations and educational opportunities related to planning, implementing, upgrading, or monitoring security measure for the protection of computer networks and information. This program of study may also include exploration into responding to computer security breaches and virus and administering network security measures.
Recommended Course Sequence
Foundations of Cybersecurity
In this course, students will develop the knowledge and skills needed to explore fundamental concepts related to the ethics, laws, and operations of cybersecurity. Students will examine trends and operations of cyberattacks, threats, and vulnerabilities. Students will review and explore security policies designed to mitigate risks. The skills obtained in this
course prepare students for additional study in cybersecurity. A variety of courses are available to students interested in this field. Foundations of Cybersecurity may serve as an introductory course in this field of study.
Internetworking Technologies I
The Internetworking Technologies I course is normally comprised of the courses called Cisco CCNA R&S: Introduction to Networks (CCNA 1) and Cisco CCNA R&S: Routing and Switching Essentials (CCNA 2). The Introduction to Networks course introduces the concept of networking, using various analogies to help the student understand the movement of packets throughout the Internet, and the protocol standards used. The Routing and Switching course moves the student into the theory of “moving packets.” The concepts of routing and switching “packets” to the correct destination is covered, and how a network administrator can direct and/or streamline this process through device configuration and deployment.
Internetworking Technologies II
The Internetworking Technologies 2 course is normally comprised of the courses called Cisco CCNA R&S: Scaling Networks (CCNA 3) and Cisco CCNA R&S: Connecting Networks (CCNA 4) The CCNA 3 course covers the architecture, components, and operations of routers and switches in larger and more complex networks. Students learn how to configure routers and switches for advanced functionality. The CCNA 4 course discusses the Wide Area Network (WAN) technologies and network services required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements.
OR
Independent Study in Technology Applications
Students will learn to make informed decisions; develop and produce original work that exemplifies the standards identified by the selected profession or discipline; and publish the product in electronic media and print. Students will practice the efficient acquisition of information by identifying task requirements, using search strategies, and using technology to access, analyze, and evaluate the acquired information. By using technology as a tool that supports the work of individuals and groups in solving problems, students will select the technology appropriate for the task, synthesize knowledge, create solutions, and evaluate the results.