Back to Learning Catalog



Estimated Completion Time

18 Weeks


We depend more and more on the technologies we interact with every day, and we put more and more of our personal data out there online. Can all of that data really be kept secret? We all need to know more about how to protect our personal information, especially given how much we rely on and use our network devices and media. You‘ll learn about the various parts of your computer, how they work together, and how you can manipulate them to keep your data safe. You’ll also dive into the tools, technologies, and methods that will help protect you from an attack and discover the many opportunities in the rapidly growing field of cybersecurity.

During this course, you will learn career-related skills and earn a badge for this accomplishment. A badge is a digital certification of your career-related learning that you can share on social media and higher education platforms, or with colleges, potential employers, peers, and colleagues. Select this link to learn more about badges.

Course Requirements

This course uses specialized software and has course activities with unique technical requirements:

  • Students must have administrative permissions for their computer (blocked on most school-issued computers).
  • Chrome Books and tablets do not meet the minimum technical requirements for this course.

Required Materials:

Software: Virtual Box:

In order to run VirtualBox on your machine, you need:

  • CPU: Recent Intel or AMD processor
  • Memory: 2+GB RAM
  • Hard disk: About 4GB free hard disk space
  • Supported Operating System: Windows, Mac OS X, Linux, Solaris and OpenSolaris.

Major Topics and Concepts

  • Basics of Cybersecurity
  • Computers and Operating Systems
  • Networking Fundamentals
  • Network Security
  • Access Control
  • Mobile Devices and Cloud Computing
  • Protecting Data
  • Trends and Challenges

Credits .5

Competency Group Overview

Meets ICT graduation requirement


  • The History and Evolution of Cyberspace, Cyber-attacks, & Cybersecurity
    Students will demonstrate an understanding of the history and evolution of cyberspace, cyber-attacks, & cybersecurity by analyzing milestones in the history of the internet, differences between cybersecurity and information assurance, and examining the security triad and availability, integrity, and confidentiality (AIC) models and how they relate to cybersecurity.
  • Computers, Operating Systems, & Networks
    Students will demonstrate an understanding of the basics of computers, operating systems, and networks by explaining the basic computer components, analyzing functions and differences of operating systems, and demonstrating and describing the characteristics, functionality, and security of different computer networks and how they integrate for our safety and protection.
  • Access Control, Mobile Devices, Cloud Computing, & Protecting Data
    Students will demonstrate an understanding of how access control is key to cyber and data protection in computer networks, mobile devices, and cloud computing by understanding how to identify vulnerabilities and risks in order to properly secure a computer and mobile device through the use of authentication, virtual private network (VPN), and remote access.
  • Trends and Challenges
    Students will demonstrate an understanding of emerging trends that affect our safety and protect us from cyber terrorism and attacks by examining the Internet of Things and its significance in cybersecurity, recognizing trends in cyberattacks and the strategies used to combat these, and identifying key legislative acts that impact cybersecurity.



Attend a virtual open house

We offer regular online open house webinars where VLACS staff members provide parents and students with an overview of our programs and answer questions about online learning.