![software development](https://cmsv2-assets.apptegy.net/uploads/8656/file/4238922/f1d4659c-2212-4086-ab9e-0964d21f36d2.png)
![CyberSecurity Students](https://cmsv2-assets.apptegy.net/uploads/8656/file/3952549/66bb0fbf-bdae-49d2-8175-9c28dcecea23.png)
![CyberSecurity Students](https://cmsv2-assets.apptegy.net/uploads/8656/file/3952569/64678e09-9027-4a9d-a359-89c72d4107dc.png)
![CyberSecurity Students](https://cmsv2-assets.apptegy.net/uploads/8656/file/3952556/50fdf4fb-1cb8-4756-aa08-4ede3eac6985.png)
![CyberSecurity coding on computer](https://cmsv2-assets.apptegy.net/uploads/8656/file/3744367/a8b67af1-049d-4a2c-b8b5-0cbfd9f7cbc6.png)
PROGRAM DESCRIPTION
Cybersecurity is an exciting, complex, and diverse field that is critical to all industries. As our lives become more dependent on internet-based tools and services, the demand for cybersecurity experience continues to expand. . In this course, we will look at, and delve into, many of the major concepts required in the field of cybersecurity. This hands-on course provides much of the foundational technical knowledge required for cybersecurity such as programming, basics of computer networking, basics of web technology, computer hardware, cryptography, secure designs of systems. Students will harden operating systems and take part in the legal/ethical issues related to cybersecurity. Students will also assess the security needs of computer and network systems, recommend safeguard solutions, and manage the implementation and maintenance of security devices. They will learn systems, and procedures to protect the property and operation of private businesses and government agencies. Students must have completed Introduction to Engineering (Engineering 1).
OFFERED AT:
![1](https://cmsv2-assets.apptegy.net/uploads/8656/file/1630983/31f81f5e-1356-4f87-9150-b6fc4bf1ebaf.png)
![Empire High logo](https://cmsv2-assets.apptegy.net/uploads/8656/file/1630882/82301524-bed2-4789-b467-4a93812b67b1.png)
IN PROGRAM PURSUITS
Here are some of the things you can look forward to while in the program:
WORK BASED LEARNING
This program and the work based learning component is being developed with our partners from Pima Community College, Raytheon and other networking and cybersecurity professionals.
PROJECTS
Building a computer
Cyber Warfare
Capture the Flag activities
Install and administer computer systems and networking technologies
Problem Solving
Design Strategy and Methodology
Data Structures
Solution Analysis
Data Processing
COMPANION CLASSES
Engineering is the beginning first class to this pathway.
CLUBS & ACTIVITIES ASSOCIATED WITH PROGRAM
FBLA
CyberPatriot
CERTIFICATIONS
To Be Determined, but credentials being considered include:
CompTIA A+
Network +
![Mrs. Matias helping Cybersecurity student](https://cmsv2-assets.apptegy.net/uploads/8656/file/3744430/c5e81b3c-efd9-4c2b-89fb-734640837afd.png)
![CyberSecurity](https://cmsv2-assets.apptegy.net/uploads/8656/file/3744441/a6434f07-0c5c-4a6f-82c7-eee916159e47.png)
![Hot Employment Destinations: Cybersecurity](https://cmsv2-assets.apptegy.net/uploads/8656/file/3540762/b1662d0f-4174-4494-bb7b-165ca6acd411.png)
![CyberSecurity](https://cmsv2-assets.apptegy.net/uploads/8656/file/3952585/eea630ba-3d4d-47b2-92ca-f8ef2f23fc48.png)