Está en la página 1de 4

Connectivity and Cybersecurity

Instructor: Christina Mehl


Website: mehlschs.weebly.com
Email: cmehl@scusd.net
Phone: 408.423.2744

Course Name: Connectivity and Cybersecurity


Pathway: CTE Information Technology
Grades: 9-12 preferably a 9th grade for IT Pathways
Pre-Requisites: None

Course Description Connectivity A.K.A Internet of Things:


The Cisco Networking Academy Introduction to the Internet of Things course provides an overview of the
concepts and challenges of the transformational IoT economy. The course discusses the Internet and its
evolution to the interconnection of people, processes, data, and things that forms the Internet of
Everything.

The course introduces the concept of a network foundation connecting billions of things and trillions of
gigabytes of data to enhance our decision making and interactions. Course modules describe how IOE
drives the convergence between an organizations operational technology (OT) and information technology
(IT) systems, and the business processes for evaluating a problem and implementing an IoE solution.
Machine-to-machine (M2M), machine-to-people (M2P), and people-to-people (P2P) connections in an IoE
solution are also covered.

This course offers the following features:


Recorded videos, presentations, and testimonials from customers and IoE experts
Activities that reinforce learning
Links to articles and websites to help you explore on your own
Chapter Tests and Quizzes to check your understanding of the information presented

Internet of Everything Careers and Pathways


By introducing unprecedented opportunities for organizations, individuals, communities and countries to
realize dramatically greater value from networked connections, IoE is creating demand for a broad
spectrum of IT jobs. The associated skills needed span multiple disciplines including computer science,
computer engineering, and software engineering.

The Internet of Everything is also creating demand for a new kind of ICT specialist; individuals with the
skillsets to create new products and process the data they collect. A workforce is needed that specializes in
both information science and software or computer engineering.

As operational technologies and information technologies converge into IoE, people must collaborate and
learn from each other to understand the machines, networks, and methodologies when developing new
processes.

Students who complete the Introduction to the Internet of Everything course will be able to perform the
following tasks:
IoE Module Learning Objectives
Describe the Internet and its evolution to the Internet of
Everything
What Is the IoE?
Explain the four pillars of IoE and how its innovations can
transform businesses
Explain the interconnection of people, process, data, and
Pillars of the IoE
things that forms the Internet of Everything

1|Mehl
Students First and Last Name:_______________________ Parent Signature: ____________________Student
Signature_________________
Explain how things that are non-IP-enabled and IP-enabled
devices can be connected to a network to communicate in the
Connecting the
Internet of Things
Unconnected
Explain programming and show a simulated version of the
Cisco Coffee JavaScript application
Explain the steps to evaluate and implement an IoE solution
Transitioning to the
Explain security concerns that must be considered when
IoE
implementing IoE solutions
Bringing It All Describe the M2M, M2P and P2P interactions of an IoE
Together Healthcare solution model

Course Description Cybersecurity


Cybersecurity refers to the people, products, and processes that protect electronic data from those with
malicious intent. This course will introduce you to various experts who discuss the concepts of
cybersecurity including what it is, why it is important, and some of the products and processes that they
use to secure data. Also covered are the opportunities within this growing field. This course is not intended
to teach you to implement security products and processes, but rather to make you aware of the global
need for cybersecurity and the advancements in this industry.

This course is intended for individuals who have, at a minimum, a basic understanding of networking
concepts. This course begins with a brief pre-test of your current knowledge of basic concepts of
networking and cybersecurity. This pre-test is designed to alert you to areas in which additional study may
be desirable to obtain the full benefit from the course material.
As you take this course, you will see that the eight content modules contain the following types of pages:

Cybersecurity Careers and Pathways


Training a cybersecurity workforce is a national priority for many countries, and the demand for
cybersecurity professionals has grown three times faster than any other job role in information and
communications technology.

There are many opportunities for career growth in this field. As people become increasingly dependent on
networks to store their personal, financial, and business data, theres greater incentive for cybercriminals
to steal or manipulate that data. The world needs people who are trained to proactively mitigate and
address these threats.

Career Pathways
The demand for cybersecurity experts has grown 3 times faster than any other IT job role, and training a
cybersecurity workforce is a priority of many governments. From confidential company data to personal
information, more connections make data more vulnerable to attacks and increase demand for
professionals with cybersecurity skills

Cybersecurity Module Learning Objectives


Explain the importance of cybersecurity in the global
The Cybersecurity
economy
Industry
Explain why cybersecurity is a growing profession
Explain the characteristics and operation of malware.
Malware and How to
Explain how hackers use unsuspecting individuals to
Protect Yourself
propagate malware
Overview of Explain why cybersecurity is critical to the banking industry
Cybersecurity in Finance Explain why cybersecurity is critical to the
and Telecommunications telecommunications industry
Explain Ciscos approach to cybersecurity.
Cisco Security Solutions
Explain the behavior-based approach to cybersecurity
Explain the characteristics of cyber warfare.
Defending Against
Explain how Ciscos Security Intelligence Operations (SIO)
Global Threats
tracks and responds to a global threat
Connectivity and Cybersecurity
Instructor: Christina Mehl
Website: mehlschs.weebly.com
Email: cmehl@scusd.net
Phone: 408.423.2744
Strategic and Explain trends in the cyber threat landscape.
Architectural Explain the framework of the Enterprise Security
Cybersecurity Planning Architecture
Vulnerabilities and Explain why cybersecurity is critical to the medical devices
Solutions industry.
Will Your Future Be in Explain the opportunities for pursuing network security
Cybersecurity? certifications

Students, who complete Internet of Everything, may take the next course in our 4-year CTE Information
Technology Pathways;
Introduction to Cybersecurity: Semester
Cisco IT EssentialsUC: Year Course
Internet Engineering 1UC: Introduction to Networks: Year Course
Internet Engineering 2UC: Routing and Switching: Year Course

Rules and Regulations


Curriculum and Internet Use
This is a college level class with a college level curriculum. You have to be able to read the
curriculum on-line to do well in this class. If you are unable to do this, this may not be the class for
you.
Students can access the curriculum on the Internet at https://www.netacad.com/
Each student will need a user name and password to login into the Cisco site. Students will take on-
line assessments after each chapter and at the end of the course.
Materials
Computer
Pencils (writing utensil)
Composition Note Book

Grading
Chapter Exams: 5%
Midterm: 10%
Case Studies 20%
Final 10%
Final Skills Based Assessment; 15%
Labs. PT & Worksheets: 30%
*Point distribution is subject to change*

KEY TO SUCCESS
Be prompt If you are not early, youre late. School policies will be enforced for all tardies and
points deducted. If you come in the room late, do not disrupt the class. Attendance is crucial for
success in this class. Saturdays are for sleeping in, not Saturday School.
Be prepared You will need a pencil (mechanicals are fine), notebook, folder, and passwords
everyday unless you are told otherwise. Go to the bathroom during passing time. Dont be that

3|Mehl
Students First and Last Name:_______________________ Parent Signature: ____________________Student
Signature_________________
person who is always asking to go to the locker, bathroom, drinking fountain, etc. You will only be
let out of class 3 times per semester.
Be productive Use your time wisely. If you dont like homework, be productive!
Be polite Please be respectful of other students, staff, and school property. Please keep all cell
phones, headphones, and other electronic devices turned off and out of sight. Food is not allowed
in the classroom. Water (only) is allowed. Please keep the room picked up and garbage put in its
place.

ATTENDANCE POLICY:
In the business world, you are expected to be at work when scheduled and on time. In preparation
for the world of work, attendance in this class will follow the same guidelines. Students that have
good attendance in class usually have better grades, have a better understanding of how powerful
business is and the role it has on everyday situations.

LATE WORK PROCEDURES: In some cases, in class work time will be given to complete assignments. Be
wise with your time! You are expected to turn in all assignments when they are due.
It is the students responsibility to meet assignment deadlines. Students will have two days to
make up assignments if the absence is excused and three days to make up a test. Unexcused
absences will result in a ZERO for that days work. Late work will be penalized one full grade (B+ to
C+) for being one day late. ZERO credit will be earned thereafter, unless arrangements have been
made with the instructor. It is the students responsibility to obtain missing assignments from the
instructor on their return to class or look on schoolloop.
Do your OWN work. Cheating and Plagiarism will not be tolerated.
Do your BEST work. This is a business class that is a building block to other classes in the
department. Be neat, professional, and thorough.

También podría gustarte