Skip to main content
Expand
Toggle Search
Expand
Toggle fullscreen
Home
Dashboard
My Courses
Calendar
English (en)
English (en)
English (United States) (en_us)
Log in
Username
Password
Remember username
Forgot Password?
Log in
Create new account
Course Overview
Sections
1
Orientation
Program Brochure
File
Student Instruction Guide
File
Welcome to SecureHigh
SCORM package
Discussion Forum, Q&A
Announcements
Forum
2
Module-1: Stories of Cybersecurity
What is Cybersecurity & Why is it Important?
SCORM package
Epic Games: Fortnite Story
SCORM package
Story of Defibrillators, a Cybernetic Journey
SCORM package
Dual Role of Cybersecurity
SCORM package
TikTok Story: Internet Safety
SCORM package
Assignment: Researching Cyber Incidents
Safeguarding your Cyber World
SCORM package
Cybersecurity & Economy
SCORM package
Cyber Guru: Basic Concepts
SCORM package
Guru's Corner: What cybersecurity Is, and Isn't
File
The Story of the Stealth Ship
SCORM package
Quiz-1-A: Myth Buster Game
SCORM package
Quiz-1-B
SCORM package
3
Module-2: Building Blocks of Your Digital World
Bits, Bytes, and Data
SCORM package
Hardware Components
SCORM package
Data, Storage, and Encryption
SCORM package
Scenario Exercise: Digital Detective - The Case Of a Sluggish Computer
SCORM package
Scenario Exercise: Digital Detective - The Graphics Glitch Mystery
SCORM package
Software Components
SCORM package
Case Study: Equifax’s Big Oops
SCORM package
Assignment: If I Were the CISO
Scenario Exercise: Digital Detective - The Mystery of the Missing Files
SCORM package
Networks and the Internet
SCORM package
Case Study : The Breach at Central High School
SCORM package
Assignment: Guardians of the School Network
Scenario Exercise: Digital Detective - The Battle of the Bugs
SCORM package
Quiz-2-A: Myth Buster Game
SCORM package
Quiz-2-B: Cyber Show Game
SCORM package
4
Module-3: Information Security
Physical, System, Network, and Data Security
SCORM package
Scenario Exercise: Cyber Detective - The Mystery of the Storage Room
SCORM package
Information Security
SCORM package
Case Study: Stuxnet And The Importance Of Layered Security
SCORM package
Case Study: The U.S. Navy's Cybersecurity Incident
SCORM package
Quiz-3A : Who wants to be a Cyber Guru Game
SCORM package
Quiz-3B
SCORM package
5
Module-4: Cyber Threats and Attacks
Threats, Attacks, and Vulnerabilities
SCORM package
Malware
SCORM package
Case Study : Ransomware Attack on Patelco Credit Union
SCORM package
Social Engineering
SCORM package
Assignment - Social Media & Social Engineering: Risks and Impacts
Game : Spot the Phish
SCORM package
Network Attacks and Other Threats
SCORM package
Stories of Cyber Attacks
SCORM package
Hacking and Hacktivism
SCORM package
A Tale of Tech and Trickery
SCORM package
Quiz-4: Cyber Show Game
SCORM package
6
Module-5: Secure Internet Practices
Secure Internet Practice
SCORM package
Case Study : Access Control in a Military Operation
SCORM package
Assignment: Stronger Passwords - Habits and Safer Practices
Safe Web-browsing Practices
SCORM package
Case Study : The 'Too Good to Be True' Trap
SCORM package
Online Privacy and Data Protection
SCORM package
Story: The Snap That Went Too Far
SCORM package
Game: Honeycomb
SCORM package
Quiz-5
SCORM package
7
Module-6: Cybersecurity Tools and Resources
Anti Virus and Anti Malware
SCORM package
Case Study WannaCry Ransomware Attack
SCORM package
Assignment: Malware Defense - Best Practices & Real Attacks
Network Segmentation
SCORM package
Firewalls and Intrusion Detection Systems
SCORM package
Virtual Private Networks (VPNs)
SCORM package
Password Managers
SCORM package
Exploring a Free Password Manager
SCORM package
Submit Your Activity: Exploring a Free Password Manager
Assignment
Fake and Real Updates
SCORM package
Case Study : When Cleaning Up Turned into a Cyber Mess
SCORM package
Case Study : A Domino Effect from a Faulty Update
SCORM package
Quiz-6-A: Who Wants to be a Cyber Guru Game
SCORM package
Quiz-6-B: Scenario Based Exercises
SCORM package
8
Module-7: Personal, Ethical and Legal Considerations
Personal Responsibility in Cybersecurity
SCORM package
Scenario Game 1: Responsible Cybersecurity Decisions
SCORM package
Assignment: Staying Cyber-Smart - The Role of Personal Responsibility
Cyber Ethics, Laws, Digital Citizenship
SCORM package
Scenario Game 2: Ethical and Legal Conduct
SCORM package
Case Study: The Facebook–Cambridge Analytica Scandal
SCORM package
Cyberbullying
SCORM package
Story: The Group Chat Gone Wrong
SCORM package
Stalking
SCORM package
Piracy, and Plagiarism
SCORM package
Case Study: The Homework Shortcut – A Student’s AI Dilemma
SCORM package
Flaming and Hate-mail
SCORM package
Spam and Rumor-mongering
SCORM package
Scams, Misinformation, Disinformation, Hoaxes
SCORM package
Pornography
SCORM package
Case Study: The “Unsendable Selfie” - A Lesson in Digital Permanence
SCORM package
Legal Frameworks in Cybersecurity
SCORM package
Quiz-7: Myth Buster Game
SCORM package
9
Module-8: Cybersecurity Trends and Fiction
The Evolving Landscape of Cybersecurity
SCORM package
Artificial Intelligence (AI) in Cybersecurity
SCORM package
Deepfakes
SCORM package
Blockchain, Distributed Ledger, and Cybersecurity
SCORM package
Quantum Computing and Cybersecurity
SCORM package
Internet of Things (IoT) and Cybersecurity
SCORM package
The Metaverse, Virtual Reality (VR), and Cybersecurity
SCORM package
Cybercrime and Defenses of the Future
SCORM package
Cybersecurity in Fiction vs. Reality
SCORM package
Assignment: Cybersecurity Fiction vs. Reality & Your Digital Future
Quiz-8: Cyber Show Game
SCORM package
10
Module-9: Introduction to Cybersecurity Careers
The Cybersecurity Career Landscape
SCORM package
Start Your Cybersecurity Journey
SCORM package
Your Cybersecurity Pathway After High School
SCORM package
Cybersecurity Careers Government Pathways
SCORM package
Cybersecurity in the Military
SCORM package
Preparing for a Cybersecurity Career
SCORM package
Assignment: Cybersecurity Career Planning Exercise
Activity Find Your Cybersecurity Role!
SCORM package
Quiz-9: Cybersecurity Career
SCORM package
11
Conclusion
Course Exam
SCORM package
Complete a Feedback Form
SecureHigh: Cybersecurity Essentials
Home
Courses
Cybersecurity
SecureHigh: Cybersecurity Essentials
Orientation
Program Brochure
Program Brochure
Click
Brochure-Secure High from iZen.pdf
link to view the file.
Jump to...
Jump to...
Student Instruction Guide
Welcome to SecureHigh
Discussion Forum, Q&A
Announcements
What is Cybersecurity & Why is it Important?
Epic Games: Fortnite Story
Story of Defibrillators, a Cybernetic Journey
Dual Role of Cybersecurity
TikTok Story: Internet Safety
Assignment: Researching Cyber Incidents
Safeguarding your Cyber World
Cybersecurity & Economy
Cyber Guru: Basic Concepts
Guru's Corner: What cybersecurity Is, and Isn't
The Story of the Stealth Ship
Quiz-1-A: Myth Buster Game
Quiz-1-B
Bits, Bytes, and Data
Hardware Components
Data, Storage, and Encryption
Scenario Exercise: Digital Detective - The Case Of a Sluggish Computer
Scenario Exercise: Digital Detective - The Graphics Glitch Mystery
Software Components
Case Study: Equifax’s Big Oops
Assignment: If I Were the CISO
Scenario Exercise: Digital Detective - The Mystery of the Missing Files
Networks and the Internet
Case Study : The Breach at Central High School
Assignment: Guardians of the School Network
Scenario Exercise: Digital Detective - The Battle of the Bugs
Quiz-2-A: Myth Buster Game
Quiz-2-B: Cyber Show Game
Physical, System, Network, and Data Security
Scenario Exercise: Cyber Detective - The Mystery of the Storage Room
Information Security
Case Study: Stuxnet And The Importance Of Layered Security
Case Study: The U.S. Navy's Cybersecurity Incident
Quiz-3A : Who wants to be a Cyber Guru Game
Quiz-3B
Threats, Attacks, and Vulnerabilities
Malware
Case Study : Ransomware Attack on Patelco Credit Union
Social Engineering
Assignment - Social Media & Social Engineering: Risks and Impacts
Game : Spot the Phish
Network Attacks and Other Threats
Stories of Cyber Attacks
Hacking and Hacktivism
A Tale of Tech and Trickery
Quiz-4: Cyber Show Game
Secure Internet Practice
Case Study : Access Control in a Military Operation
Assignment: Stronger Passwords - Habits and Safer Practices
Safe Web-browsing Practices
Case Study : The 'Too Good to Be True' Trap
Online Privacy and Data Protection
Story: The Snap That Went Too Far
Game: Honeycomb
Quiz-5
Anti Virus and Anti Malware
Case Study WannaCry Ransomware Attack
Assignment: Malware Defense - Best Practices & Real Attacks
Network Segmentation
Firewalls and Intrusion Detection Systems
Virtual Private Networks (VPNs)
Password Managers
Exploring a Free Password Manager
Submit Your Activity: Exploring a Free Password Manager
Fake and Real Updates
Case Study : When Cleaning Up Turned into a Cyber Mess
Case Study : A Domino Effect from a Faulty Update
Quiz-6-A: Who Wants to be a Cyber Guru Game
Quiz-6-B: Scenario Based Exercises
Personal Responsibility in Cybersecurity
Scenario Game 1: Responsible Cybersecurity Decisions
Assignment: Staying Cyber-Smart - The Role of Personal Responsibility
Cyber Ethics, Laws, Digital Citizenship
Scenario Game 2: Ethical and Legal Conduct
Case Study: The Facebook–Cambridge Analytica Scandal
Cyberbullying
Story: The Group Chat Gone Wrong
Stalking
Piracy, and Plagiarism
Case Study: The Homework Shortcut – A Student’s AI Dilemma
Flaming and Hate-mail
Spam and Rumor-mongering
Scams, Misinformation, Disinformation, Hoaxes
Pornography
Case Study: The “Unsendable Selfie” - A Lesson in Digital Permanence
Legal Frameworks in Cybersecurity
Quiz-7: Myth Buster Game
The Evolving Landscape of Cybersecurity
Artificial Intelligence (AI) in Cybersecurity
Deepfakes
Blockchain, Distributed Ledger, and Cybersecurity
Quantum Computing and Cybersecurity
Internet of Things (IoT) and Cybersecurity
The Metaverse, Virtual Reality (VR), and Cybersecurity
Cybercrime and Defenses of the Future
Cybersecurity in Fiction vs. Reality
Assignment: Cybersecurity Fiction vs. Reality & Your Digital Future
Quiz-8: Cyber Show Game
The Cybersecurity Career Landscape
Start Your Cybersecurity Journey
Your Cybersecurity Pathway After High School
Cybersecurity Careers Government Pathways
Cybersecurity in the Military
Preparing for a Cybersecurity Career
Assignment: Cybersecurity Career Planning Exercise
Activity Find Your Cybersecurity Role!
Quiz-9: Cybersecurity Career
Course Exam
Complete a Feedback Form
Next Activity