Back to Learning Catalog



Estimated Completion Time

18 Weeks


Ever wonder what it’s like to be a hacker? Or think about who is trying to steal your passwords while you’re shopping online using the free Wi-Fi at your local coffee shop? Unmask the cybersecurity threats around you by understanding hackers and identifying weaknesses in your online behavior. Learn to avoid the various types of cyber attacks, including those to your social media accounts, and to predict the potential legal consequences of sharing or accessing information that you do not have rights to. Dig into these crimes in depth by taking a look at cyber forensics and other cybersecurity careers. In a world where such threats have no boundaries, cybersecurity will undoubtedly play an increasingly larger role in our personal and professional lives in the years to come.

During this course, you will learn career-related skills and earn a badge for this accomplishment. A badge is a digital certification of your career-related learning that you can share on social media and higher education platforms, or with colleges, potential employers, peers, and colleagues. Select this link to learn more about badges.

Course Requirements

This course uses specialized software and has course activities with unique technical requirements:

  • Students must have administrative permissions for their computer (blocked on most school-issued computers).
  • Chrome Books and tablets do not meet the minimum technical requirements for this course.

Required Materials:

Software: Wireshark:

In order to run Wireshark on your machine, you need:

  • Hard disk: USB memory stick (Recommended to be at least 4 gigs)
  • Memory: 2+GB RAM
  • Supported Operating System: Windows, Mac OS X

Software: Virtual Box:

In order to run VirtualBox on your machine, you need:

  • CPU: Recent Intel or AMD processor
  • Memory: 2+GB RAM
  • Hard disk: About 4GB free hard disk space
  • Supported Operating System: Windows, Mac OS X, Linux, Solaris and OpenSolaris.

Major Topics and Concepts

  • Cybersecurity Threats
  • Laws, Ethics, and Digital Boundaries
  • Black Hats
  • Cyber Safety
  • Personal Cybersecurity Inventory
  • White Hat Hackers
  • Incident Response, Investigations, and Digital Forensics
  • Cybersecurity Careers

Credits .5

Competency Group Overview

Meets ICT graduation requirement


  • Cybersecurity Threats and Laws, Ethics and Digital Boundaries
    Students will demonstrate an understanding of cybersecurity threats and the laws, as well as ethics and digital boundaries use by exploring motivations behind cyber attacks, examining the strategies of ethical and malicious hackers, analyzing the impact of cyber breaches on individuals, society and the world, and explaining legislation that impacts cybersecurity.
  • Black Hats and Cyber Safety
    Students will demonstrate an understanding of Black Hat Hackers and Cyber Safety by examining the significance of the darknet, various methodologies used by hackers, different types of social engineering attacks, the effect of social media on cybersecurity and personal privacy, and recognizing the importance of security for email and web browsing.
  • Personal Cybersecurity and White Hat Hackers
    Students will demonstrate an understanding of personal cybersecurity and White Hat Hackers by examining ways to safeguard themselves and their digital assets, how to identify cyber risks, four levels of risk assessment, and the principles and practice of ethical hacking.
  • Investigations, Digital Forensics, & Cybersecurity Careers
    Students will demonstrate an understanding of careers in cybersecurity by describing various employment opportunities, their professional requirements, technology skills required in the field of cybersecurity, and examining the process of cyber forensics through investigations and digital forensics.


Cybersecurity 1a

Attend a virtual open house

We offer regular online open house webinars where VLACS staff members provide parents and students with an overview of our programs and answer questions about online learning.