Course Modules
Demonstrating Personal Qualities and Abilities
Demonstrating Personal Qualities and Abilities
Module Completed
Module In Progress
Module Locked
-
PageDemonstrate creativity and innovation. Demonstrate creativity and innovation.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate critical thinking and problem-solving. Demonstrate critical thinking and problem-solving.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate initiative and self-direction. Demonstrate initiative and self-direction.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate integrity. Demonstrate integrity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate work ethic. Demonstrate work ethic.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Demonstrating Interpersonal Skills
Demonstrating Interpersonal Skills
Module Completed
Module In Progress
Module Locked
-
PageDemonstrate conflict-resolution skills. Demonstrate conflict-resolution skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate listening and speaking skills. Demonstrate listening and speaking skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate respect for diversity. Demonstrate respect for diversity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate customer service skills. Demonstrate customer service skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageCollaborate with team members. Collaborate with team members.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Demonstrating Professional Competencies
Demonstrating Professional Competencies
Module Completed
Module In Progress
Module Locked
-
PageDemonstrate big-picture thinking. Demonstrate big-picture thinking.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate career- and life-management skills. Demonstrate career- and life-management skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate continuous learning and adaptability. Demonstrate continuous learning and adaptability.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageManage time and resources. Manage time and resources.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate information-literacy skills. Demonstrate information-literacy skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate an understanding of information security. Demonstrate an understanding of information security.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageMaintain working knowledge of current information-technology (IT) systems. Maintain working knowledge of current information-technology (IT) systems.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate proficiency with technologies, tools, and machines common to a specific occupation. Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageApply mathematical skills to job-specific tasks. Apply mathematical skills to job-specific tasks.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate professionalism. Demonstrate professionalism.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate reading and writing skills. Demonstrate reading and writing skills.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate workplace safety. Demonstrate workplace safety.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Examining All Aspects of an Industry
Examining All Aspects of an Industry
Module Completed
Module In Progress
Module Locked
-
PageExamine aspects of planning within an industry/organization. Examine aspects of planning within an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine aspects of management within an industry/organization. Examine aspects of management within an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine aspects of financial responsibility within an industry/organization. Examine aspects of financial responsibility within an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine technical and production skills required of workers within an industry/organization. Examine technical and production skills required of workers within an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine principles of technology that underlie an industry/organization. Examine principles of technology that underlie an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine labor issues related to an industry/organization. Examine labor issues related to an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine community issues related to an industry/organization. Examine community issues related to an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine health, safety, and environmental issues related to an industry/organization. Examine health, safety, and environmental issues related to an industry/organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Addressing Elements of Student Life
Addressing Elements of Student Life
Module Completed
Module In Progress
Module Locked
-
PageIdentify the purposes and goals of the student organization. Identify the purposes and goals of the student organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify Internet safety issues and procedures for complying with acceptable use standards. Identify Internet safety issues and procedures for complying with acceptable use standards.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Work-Based Learning
Exploring Work-Based Learning
Module Completed
Module In Progress
Module Locked
-
PageIdentify the types of work-based learning (WBL) opportunities. Identify the types of work-based learning (WBL) opportunities.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Reflect on lessons learned during the WBL experience. (Optional) Reflect on lessons learned during the WBL experience.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplore career opportunities related to the WBL experience. Explore career opportunities related to the WBL experience.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Participate in a WBL experience, when appropriate. (Optional) Participate in a WBL experience, when appropriate.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Cybersecurity Fundamentals
Exploring Cybersecurity Fundamentals
Module Completed
Module In Progress
Module Locked
-
PageDescribe cybersecurity. Describe cybersecurity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the critical factors of information assurance. Describe the critical factors of information assurance.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDefine vulnerability and risk. Define vulnerability and risk.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain why organizations need to manage risk. Explain why organizations need to manage risk.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the concepts of cybersecurity risk management. Identify the concepts of cybersecurity risk management.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe cybersecurity threats to an organization. Describe cybersecurity threats to an organization.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe national and industry standards and regulations that relate to cybersecurity. Describe national and industry standards and regulations that relate to cybersecurity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the cyberattack surface of various organizations. Describe the cyberattack surface of various organizations.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageAnalyze risks affecting critical infrastructure. Analyze risks affecting critical infrastructure.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Examining Computer Networks as a Foundational Element of Cybersecurity
Examining Computer Networks as a Foundational Element of Cybersecurity
Module Completed
Module In Progress
Module Locked
-
PageDescribe computer components. Describe computer components.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe a network. Describe a network.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe a wired network. Describe a wired network.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe a wireless network. Describe a wireless network.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Compare wired and wireless networks. (Optional) Compare wired and wireless networks.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageCompare networking conceptual models. Compare networking conceptual models.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDiscuss services and potential vulnerabilities. Discuss services and potential vulnerabilities.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDifferentiate between network types. Differentiate between network types.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the concept of the Internet as a network of connected systems. Describe the concept of the Internet as a network of connected systems.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify networking protocols. Identify networking protocols.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Understanding Cyber Threats and Vulnerabilities
Understanding Cyber Threats and Vulnerabilities
Module Completed
Module In Progress
Module Locked
-
PageDifferentiate between a cyber threat and a vulnerability. Differentiate between a cyber threat and a vulnerability.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe types of cyber threats. Describe types of cyber threats.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageAnalyze types of current cyber threats. Analyze types of current cyber threats.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the concept of malware and the techniques to guard against it. Describe the concept of malware and the techniques to guard against it.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the perpetrators of different types of malicious hacking. Identify the perpetrators of different types of malicious hacking.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the characteristics of vulnerabilities. Describe the characteristics of vulnerabilities.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the prevention of and protections against cyber threats. Identify the prevention of and protections against cyber threats.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks. (Optional) Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Ethics as it Relates to Cybersecurity
Exploring Ethics as it Relates to Cybersecurity
Module Completed
Module In Progress
Module Locked
-
PageDifferentiate between ethics and laws. Differentiate between ethics and laws.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDistinguish among types of ethical concerns. Distinguish among types of ethical concerns.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDefine cyberbullying. Define cyberbullying.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify actions that constitute cyberbullying. Identify actions that constitute cyberbullying.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Identify possible warning signs of someone being cyberbullied. (Optional) Identify possible warning signs of someone being cyberbullied.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Demonstrate net etiquette (i.e., netiquette) as it relates to cybersecurity. (Optional) Demonstrate net etiquette (i.e., netiquette) as it relates to cybersecurity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify laws applicable to cybersecurity. Identify laws applicable to cybersecurity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Data Privacy
Exploring Data Privacy
Module Completed
Module In Progress
Module Locked
-
PageExplain the concept of “personally identifiable information.” Explain the concept of “personally identifiable information.”Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain why personal data is valuable to both an individual and to organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it. Explain why personal data is valuable to both an individual and to organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain the techniques used to collect personal data through social media, web tracking, and mobile devices. Explain the techniques used to collect personal data through social media, web tracking, and mobile devices.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify ways to control and protect personal data. Identify ways to control and protect personal data.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageAnalyze the social and legal significance of the ongoing collection of personal digital information. Analyze the social and legal significance of the ongoing collection of personal digital information.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Examining Data Security as it Relates to Cybersecurity
Examining Data Security as it Relates to Cybersecurity
Module Completed
Module In Progress
Module Locked
-
PageDistinguish between data, information, and knowledge. Distinguish between data, information, and knowledge.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the most common ways data is collected. Identify the most common ways data is collected.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the most common ways data can be stored. Identify the most common ways data can be stored.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain the difference between data at rest, data in transit, and data being processed. Explain the difference between data at rest, data in transit, and data being processed.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the most common ways data is used. Identify the most common ways data is used.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDiscuss how data can be compromised, corrupted, or lost. Discuss how data can be compromised, corrupted, or lost.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExplain how businesses and individuals can protect themselves against threats to their data. Explain how businesses and individuals can protect themselves against threats to their data.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Securing Operating Systems
Securing Operating Systems
Module Completed
Module In Progress
Module Locked
-
PageDefine the function of a computer operating system. Define the function of a computer operating system.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Identify the components of an operating system. (Optional) Identify the components of an operating system.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageList types of operating systems. List types of operating systems.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify examples of widely used desktop and server operating systems. Identify examples of widely used desktop and server operating systems.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageEvaluate the potential vulnerabilities, threats, and common exploits to an operating system. Evaluate the potential vulnerabilities, threats, and common exploits to an operating system.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify best practices for protecting operating systems. Identify best practices for protecting operating systems.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageEvaluate critical operating system security parameters. Evaluate critical operating system security parameters.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Describe security and auditing logs. (Optional) Describe security and auditing logs.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Describe the role of a system backup. (Optional) Describe the role of a system backup.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDefine virtualization technology. Define virtualization technology.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Identify advantages and disadvantages of using virtual machines. (Optional) Identify advantages and disadvantages of using virtual machines.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Programming as a Component of Cybersecurity
Programming as a Component of Cybersecurity
Module Completed
Module In Progress
Module Locked
-
PageIdentify representation of data at lowest levels. Identify representation of data at lowest levels.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDefine programming in the context of cybersecurity. Define programming in the context of cybersecurity.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDifferentiate between computer programming languages. Differentiate between computer programming languages.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Describe Python. (Optional) Describe Python.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Demonstrate Linux. (Optional) Demonstrate Linux.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Page(Optional) Evaluate common programming flaws that lead to vulnerabilities. (Optional) Evaluate common programming flaws that lead to vulnerabilities.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify best practices in secure coding and design. Identify best practices in secure coding and design.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Cybersecurity Implications for Current and Emerging Technologies
Exploring Cybersecurity Implications for Current and Emerging Technologies
Module Completed
Module In Progress
Module Locked
-
PageIdentify ubiquitous computing. Identify ubiquitous computing.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescription security and privacy implications of ubiquitous computing. Description security and privacy implications of ubiquitous computing.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Exploring Cybersecurity Careers
Exploring Cybersecurity Careers
Module Completed
Module In Progress
Module Locked
-
PageResearch career opportunities for cybersecurity professionals. Research career opportunities for cybersecurity professionals.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageExamine the Career Clusters affected by current and emerging technology. Examine the Career Clusters affected by current and emerging technology.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify the educational pathways for emerging cybersecurity professionals. Identify the educational pathways for emerging cybersecurity professionals.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIdentify career paths and job titles within the cybersecurity and/or cyber forensics industry and Career Clusters. Identify career paths and job titles within the cybersecurity and/or cyber forensics industry and Career Clusters.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageResearch the cyber threats and security measures related to career pathways. Research the cyber threats and security measures related to career pathways.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Preparing for Industry Certification
Preparing for Industry Certification
Module Completed
Module In Progress
Module Locked
-
PageIdentify testing skills and strategies for a certification examination. Identify testing skills and strategies for a certification examination.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDescribe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course. Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageDemonstrate the ability to complete selected practice examinations. Demonstrate the ability to complete selected practice examinations.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageSuccessfully complete an industry certification examination representative of skills learned in this course. Successfully complete an industry certification examination representative of skills learned in this course.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete