SecureHigh: Cybersecurity Essentials

  • Fully Online, Self-paced Learning Program
  • Learn from World-class Cybersecurity Experts
  • Cybersecurity concepts and Fun facts
  • Interactive, Gamified Learning Experience
  • Scenario Exercises and Engaging Trivia
  • Real-world Case studies, Practical Insights
  • Knowledge Checks and Quizzes

https://izen.ai/

Email: info@izen.ai

PREREQUISITES:

  • None

Module-1: Stories of Cybersecurity

  • What is Cybersecurity and Why is it Important?
  • Dual Role of Cybersecurity
  • Basic Concepts of Cybersecurity
  • Cybersecurity & Economy
  • Stories: (a)TikTok (b)Defibrillators (c)Stealth Ship
  • Case Study: Epic Games
  • Assignment: Research Cyber Incidents
  • Quiz: MythBusters Game

Module-2: Building Blocks of Your Digital World

  • Bits, Bytes, and Data
  • Hardware Components
  • Data, Storage, and Encryption
  • Software Components
  • Networks and the Internet
  • Case Studies: (a) Equifax (b) Central High School
  • Scenario Games: (a) Graphics Glitch (b) Bugs (c) Missing Files (d) Sluggish Computer
  • Scenario Exercise: Guardians of the School Network
  • Quiz: Cyber Jeopardy Game

Module-3: Information Security

  • Physical, System, Network, and Data Security
  • Information Security
  • Scenario Games: (a) Unexpected Alarm (b) Integrity, Confidentiality & Availability
  • Case Studies: (a) Stuxnet (b) Navy's Cyber Incident
  • Quiz: Who Wants to Be a Cyber Guru Game

Module-7: Personal, Ethical, and Legal Considerations

  • Personal Responsibility in Cybersecurity
  • Cyber Ethics, Laws, Digital Citizenship
  • Cyberbullying, Stalking
  • Piracy and Plagiarism
  • Flaming and Hate-mail
  • Spam and Rumor-mongering
  • Scams, Misinformation, Disinformation, and Hoaxes
  • Pornography
  • Legal Frameworks in Cybersecurity
  • Ethical Dilemmas in Cybersecurity
  • Scenario Exercises: Responsible Decisions
  • Story: The Group Chat Gone Wrong
  • Case Studies: (a) Cambridge Analytica (b) Unsendable Selfie (c) Homework Shortcut
  • Assignment: Self-Reflection
  • Quiz: MythBusters Game

Module-4: Threats and Attacks

  • Vulnerabilities, Threats, and Attacks
  • Malware
  • Social Engineering
  • Network Attacks and Other Threats
  • Hacking and Hacktivism
  • Scenario Game: Spot The Phishing Emails
  • Stories of Cyber Attacks
  • A Tale of Tech and Trickery
  • Case Study: PatelCo Ransomware Attack
  • Quiz: Cyber Show Game

Module-5: Secure Internet Practices

  • Password Security and Authentication
  • Safe Web-browsing Practices
  • Online Privacy and Data Protection
  • Case Studies: (a) Military Operation (b) 'Too Good to Be True' Trap
  • Story: The Snap That Went Too Far
  • Quiz: Honeycomb Game

Module-6: Cybersecurity Tools and Resources Practices

  • Anti-Virus and Anti-Malware
  • Network Segmentation
  • Firewalls and Intrusion Detection Systems
  • Virtual Private Networks (VPNs)
  • Fake and real software updates
  • Password Managers
  • Hands-On: Explore a Free Password Manager
  • Case Studies: (a) WannaCry Ransomware (b) CCleaner (c) CrowdStrike
  • Quiz: Who Wants to be a Cyber Guru Game
  • Quiz: Scenario-based Game

Module-8: Cybersecurity Trends and Fiction

  • The Evolving Landscape of Cybersecurity
  • Artificial Intelligence (AI) in Cybersecurity
  • Deepfakes
  • Blockchain, Distributed Ledger, and Cybersecurity
  • Quantum Computing and Cybersecurity
  • Internet of Things (IoT) and Cybersecurity
  • The Metaverse VR and Cybersecurity
  • Cybercrime and Defenses of the Future
  • Cybersecurity in Fiction vs. Reality
  • Quiz: Jeopardy Game

Module-9: Introduction to Cybersecurity Careers

  • Roles in Securing Organizations, Infrastructure and the Nation
  • Start Your Cybersecurity Journey Today
  • Cybersecurity Pathways for High School and College Students
  • Cybersecurity Pathways in Government
  • Quiz

Module-1: Stories of Cybersecurity

  • What is Cybersecurity and Why is it Important?
  • Dual Role of Cybersecurity
  • Basic Concepts of Cybersecurity
  • Cybersecurity & Economy
  • Stories: (a)TikTok (b)Defibrillators (c)Stealth Ship
  • Case Study: Epic Games
  • Assignment: Research Cyber Incidents
  • Quiz: MythBusters Game

Module-2: Building Blocks of Your Digital World

  • Bits, Bytes, and Data
  • Hardware Components
  • Data, Storage, and Encryption
  • Software Components
  • Networks and the Internet
  • Case Studies: (a) Equifax (b) Central High School
  • Scenario Games: (a) Graphics Glitch (b) Bugs (c) Missing Files (d) Sluggish Computer
  • Scenario Exercise: Guardians of the School Network
  • Quiz: Cyber Jeopardy Game

Module-3: Information Security

  • Physical, System, Network, and Data Security
  • Information Security
  • Scenario Games: (a) Unexpected Alarm (b) Integrity, Confidentiality & Availability
  • Case Studies: (a) Stuxnet (b) Navy's Cyber Incident
  • Quiz: Who Wants to Be a Cyber Guru Game

Module-4: Threats and Attacks

  • Vulnerabilities, Threats, and Attacks
  • Malware
  • Social Engineering
  • Network Attacks and Other Threats
  • Hacking and Hacktivism
  • Scenario Game: Spot The Phishing Emails
  • Stories of Cyber Attacks
  • A Tale of Tech and Trickery
  • Case Study: PatelCo Ransomware Attack
  • Quiz: Cyber Show Game

Module-5: Secure Internet Practices

  • Password Security and Authentication
  • Safe Web-browsing Practices
  • Online Privacy and Data Protection
  • Case Studies: (a) Military Operation (b) 'Too Good to Be True' Trap
  • Story: The Snap That Went Too Far
  • Quiz: Honeycomb Game

Module-6: Cybersecurity Tools and Resources Practices

  • Anti-Virus and Anti-Malware
  • Network Segmentation
  • Firewalls and Intrusion Detection Systems
  • Virtual Private Networks (VPNs)
  • Fake and real software updates
  • Password Managers
  • Hands-On: Explore a Free Password Manager
  • Case Studies: (a) WannaCry Ransomware (b) CCleaner (c) CrowdStrike
  • Quiz: Who Wants to be a Cyber Guru Game
  • Quiz: Scenario-based Game

Module-7: Personal, Ethical, and Legal Considerations

  • Personal Responsibility in Cybersecurity
  • Cyber Ethics, Laws, Digital Citizenship
  • Cyberbullying, Stalking
  • Piracy and Plagiarism
  • Flaming and Hate-mail
  • Spam and Rumor-mongering
  • Scams, Misinformation, Disinformation, and Hoaxes
  • Pornography
  • Legal Frameworks in Cybersecurity
  • Ethical Dilemmas in Cybersecurity
  • Scenario Exercises: Responsible Decisions
  • Story: The Group Chat Gone Wrong
  • Case Studies: (a) Cambridge Analytica (b) Unsendable Selfie (c) Homework Shortcut
  • Assignment: Self-Reflection
  • Quiz: MythBusters Game

Module-8: Cybersecurity Trends and Fiction

  • The Evolving Landscape of Cybersecurity
  • Artificial Intelligence (AI) in Cybersecurity
  • Deepfakes
  • Blockchain, Distributed Ledger, and Cybersecurity
  • Quantum Computing and Cybersecurity
  • Internet of Things (IoT) and Cybersecurity
  • The Metaverse VR and Cybersecurity
  • Cybercrime and Defenses of the Future
  • Cybersecurity in Fiction vs. Reality
  • Quiz: Jeopardy Game

Module-9: Introduction to Cybersecurity Careers

  • Roles in Securing Organizations, Infrastructure and the Nation
  • Start Your Cybersecurity Journey Today
  • Cybersecurity Pathways for High School and College Students
  • Cybersecurity Pathways in Government
  • Quiz
Picture1-Copy-2.png

Lead Instructor

fac3.png

Dr. Fred Cohen

Dr. Cohen is an ISC 2 fellow recognized as the “father of computer virus” who also came up with early virus defense mechanisms. He won several international awards in Cybersecurity and is globally recognized as an innovative expert in information protection and Cybersecurity, with 40+ years of experience building companies and supporting risk management and strategic decision-making. He worked on critical infrastructure and cyber warfare defenses, joined Sandia National Laboratories, and worked to secure the US nuclear complex and for the President’s Commission. He has built cyberlabs for Webster University and developed career-aligned cybersecurity programs for iZen.

His rich experience and network will provide the required guidance and support to iZen. He has a Ph.D. in Electrical Engineering (University of Southern California), an MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie-Mellon University).

    Instructional Team

Winn Schwartau

Winn is a prolific writer who has been working on making Internet and computer ethics for kids a national educational priority. He is the president of Interpact, Inc., a security awareness consulting firm, that develops innovative and entertaining corporate awareness programs. He founded InfoWarCon, and InfoWar.com, coined the term “Electronic Pearl Harbor” and was the project-lead of the “Manhattan Cyber Project Information Warfare/Electronic Civil Defense Team”.

He has written several popular books like Internet and computer ethics for kids, Pearl Harbor dot com, Cybershock, Time-based Security, Information Warfare, etc. He is a popular speaker who always keeps his audience entertained and awake with thought-provoking insights, commentary, and interactivity. He speaks at distinguished private, government, and military institutions. This will help immensely in making SecureHigh aligned and engaging for the target audience.

John Tippit

John is a nationally recognized security practitioner and educator whose career spans 46 years. He has been providing security services to the National Security Community, both Government and Industry, like developing Risk Management Strategy for the U.S. Security Policy staff and several studies for DARPA. He has several awards and publications in the cybersecurity space. Also, he has extensive experience in the development of security courses and programs, like Principals of Applying Security to the Business Process (a 3-unit college course); Professional Security Practitioner Training Program (a series of six professional development courses), etc.

He holds a BS in Business Management from Alexander Hamilton Institute, and an ALPP from La Salle University, Philadelphia.

Dr. Tom Johnson

Dr. Johnson serves as Vice Chair, Board of Directors of the Sans Technology Institute (Graduate Cyber Security Programs, and Professional Education and Corporate Training Programs), and CEO of Cyberspace Strategies. He was a member of the Electronic Crime Task Force (US Secret Services), the American Academy of Forensic Sciences, and the FBI InfraGard Program. He has also worked as visiting professor at the US Army war college, and the International Association of Chiefs of Police.

He was a special consultant to the US state department. He has worked on educational program development for 14 different universities and colleges. He was the Chief of Strategic Initiatives for Webster University, where he introduced the Cyber Security program which has been offered on military bases. He has evaluated many Cybersecurity programs. He has an MS, and BS in Police Administration and Public Safety, Doctor of criminology (UC Berkeley).

About iZen

iZen.AI Founder on AI Ed Tech and Workforce Development

iZen is a workforce development company offering end-to-end solutions for skill development, leveraging the power of AI and other digital technologies. The company was founded in Silicon Valley, California, with a vision to empower the next generation workforce.

Awards and Recognition

ONR Logo
  • US Navy project to create a Cybersecurity Workforce Development Solution
US_DEPARTMENT_OF_ENERGY_Logo
  • SBIR Award from the US-DOE for Inclusive Workforce Development Solution
GSA-MAS-01
  • GSA MAS Approved Company
cisco_problem_solver
  • Cisco Global Problem Solver Challenge 2022 Finalist
Defense Innovation 2024-Awardee
  • 2024 Defense Innovation Challenge Awardee (Digital Track)
DoD-skillbridge-Partner
  • DoD SkillBridge Partner to train Service members for careers in AI & Cybersecurity

Ready to Enroll?

Email: info@izen.ai

Scroll to Top