This course is ideal for middle school, high school, and college students preparing for the CyberPatriot National Youth Cyber Defense Competition. It’s also valuable for educators, mentors, and team coaches who want to guide students in building cybersecurity skills. Whether you’re a beginner exploring online safety or an aspiring IT professional aiming to gain hands-on experience in defending Windows and Linux systems, this course will help you strengthen your knowledge and prepare for CyberPatriot challenges.
What you will learn
- Grasp the CIA Triad principles
- Implement basic and advanced cybersecurity techniques
- Navigate Microsoft Windows and MSDN
- Understand Linux and Ubuntu fundamentals
- Apply ethical hacking tools and techniques
- Develop critical incident response skills
Course Outline
Introduction to CyberPatriot and Cybersecurity
- Program Overview
- CyberPatriot and Cybersecurity
- The Competition
- Introduction to Cybersecurity
Introduction to Online Safety
- Online Safety
- Online Safety Part 2
Cyber Ethics
- Cyber Ethics
- Current Event 1
- Current Event 2
- Current Event 3
- Scenario 1
- Scenario 2
- Scenario 3
- Scenario 4
- Scenario 5
- Scenario 6
Principles of Cybersecurity
- Principles of Cybersecurity
- CIA Triad
- Threats and Vulnerabilities
- Cyber Threats and Countermeasures
- Cyber Threats and Countermeasures Part 2
- Basic Cybersecurity Techniques
- Basic Cybersecurity Techniques Part 2
Computer Basics and Virtualization
- Computer Basics and Virtualization
- How Computers Work
- How Computers Work Part 2
- Virtual Machines
- Networking Basics
Microsoft Windows Basic and MSDN
- Microsoft Windows Basics and MSDN
- Windows Version History
- Windows Basics
- What is MSDN
- How to Use MSDN for Training
Microsoft Windows Security Tools
- Microsoft Windows Security Tools
- Basic Security Policies and Tools
- Basic Security Policies and Tools Part 2
- Basic Security Policies and Tools Part 3
- Account Management
- Account Management Part 2
Microsoft Windows Security Configuration
- Microsoft Windows Security Configuration
- Windows File Protections
- Windows Auditing
- Performance Monitoring
Introduction to Linux and Ubuntu
- Introduction to Linux and Ubuntu
- What is Linux
- Ubuntu Terminology and Concepts
- Introduction to Ubuntu Command Lines
- Introduction to Ubuntu Command Line Part 2
Ubuntu Security Configuration
- Ubuntu Security
- Basic GUI Security
- Basic Command Line Security
- Advanced Ubuntu Security