View on GitHub


A curriculum for a high school cyber security course.

Cyber Security

A curriculum for a high school cyber security course.

This curriculum is designed for a high school computer science course focused on cyber security. Each of the units have activities that could be used with or without prior coding knowledge so the course is customizable to the needs of the given students/teacher.



The units and topics outlined are designed to be stand-alone. Each unit can be taught alone or all of the units could be taught as a full-year course in cyber security.

This repository is designed to be teacher-facing and it is left to the teacher to use an existing LMS or other method of giving links, activities, and supporting documents to the students.

Interwoven Projects

Throughout the year, there are several ongoing projects. Some of these activities will be called out specifically in a lesson but for the majority of the time these are activities which can be slotted in by the instructor.

Blog - Each student should maintain a blog. There are many online blog platforms available. If privacy is a concern, the blog could be done in a document that the student shares with the instructor. The goal of the blog is for students to express thoughts on cyber security principles and ideas, and as a way for students to better think about how they will engage with the topics being discussed.

So much of the class is designed to inform and make students aware of cyber principles. The blog gives a context for how they will act based on the knowledge and how they would let others know how to act to remain secure online.

News Articles - This can be done weekly or as frequently as you find useful. Students will read online news stories about cyber security, hacking, or other security issues. As with the blog, the goal is to raise awareness of cyber events and to make students more vigilant cyber citizens.

Sample News Note

Good websites for cyber news:

Capture the Flag (CTF) - Throughout the year, you will be able to find online cyber security scavenger hunts called capture the flags or CTFs for short. There are a number of these geared toward high school students and this is frequently a good way to see what the students are learning in a fun, engaging, game-like way.


There are several resources that are used throughout the curriculum. As with any of the lessons you can customize what works for you and what doesn’t.

CodeAcademy It may be useful to look at several of the lessons in Code Academy depending on the background and interest of your students. Lessons that will be useful are noted throughout the curriculum but they are specifically:

Blown to Bits Book Blown to Bits is a book that looks at many aspects of digital life, it’s history, and where it might go. This is a free book online but can also be purchased as a physical book.

The Code Book The Code Book by Simon Singh looks at historical cryptography and tells the story behind the mathematics. This book is a great way to engage students with the material through story and the literal life and death struggle of people using and inventing cryptographic methods. This book is an adaptation of his original Code Book designed for young adult readers.

Cloud 9 Cloud 9 is a development workspace that allows people to create full web sites or services. We use the service to demonstrate web vulnerabilities and how to prevent them. The service is free for students but it does require a credit card when signing up. I recommend creating a teacher account where you can have as many teams as you want. This services does cost $1 a month. If you want to do the programming activities and want to run the code locally on the computers. I recommend the IDE from though there are many others available. All of the coding activities have been written using Python 3.

Dr. Java Dr. Java is a lightweight Java IDE that is very forgiving of a computer that does not have the full Java SDK installed. There are a few times when running a Java application will be useful in the curriculum and this allows students to run the code. has several courses designed to teach coding and a wider understanding of computer science. Several lessons in their Computer Science Principles course are extremely applicable to cyber security and have been included here. The instructor will need to setup an account with and give all students a login for this portion to work.


Cyber Security Curriculum Creative Commons License is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.