Advanced Cybersecurity Semester 2
Enrollment Message
Available for August 2026 registration. Students need access to a webcam or video recording device.
Course Description
This course will guide you through the essential skills and knowledge needed to protect modern computer systems and networks from cyber threats. You will learn how attackers operate, how vulnerabilities are discovered and managed, and how organizations prepare for and respond to security incidents. Throughout the course, you will explore real-world tools, attack frameworks, risk management strategies, endpoint security controls, disaster recovery planning, and digital evidence handling. By the end, you will understand how cybersecurity teams work to keep systems safe, how your own actions can strengthen or weaken security, and how to apply practical strategies to prevent, detect, and respond to cyberattacks in any environment.
- Indiana Core40 Diploma Applicable through class of 2028
- Counts as a directed elective or elective all diplomas
- Indiana NEW Diploma Applicable for students entering school in 2025-26 (Class of 2029)
- Fulfills an Elective Credit
Course Goals
Upon completion of the course, students will…
- identify common endpoint security threats and the protections used to mitigate them.
- explain the importance of regularly updating hardware and software on endpoints.
- distinguish between indicators and precursors of security incidents.
- analyze vulnerabilities using industry tools, scanners, and vulnerability databases.
- prioritize assets and vulnerabilities based on severity, exposure, and business impact.
- compare different risk management strategies used to reduce organizational risk.
- describe the phases of the vulnerability management lifecycle.
- apply disaster recovery concepts such as RTO, RPO, and backup types to business scenarios.
- summarize the components and purpose of business continuity and disaster recovery plans.
- interpret audit logs and system logs to identify potential security events.
- outline the phases of the Incident Response Lifecycle and the responsibilities of the IRT.
- differentiate among major attack frameworks, including MITRE ATT&CK, the Cyber Kill Chain, and the Diamond Model.
Indiana Academic Standards
Units of Instruction
- Unit 1 Endpoint Security Concepts Part II
- Unit 2 Vulnerability Assessment and Risk Management Part I
- Unit 3 Vulnerability Assessment and Risk Management Part II
- Unit 4 Incident Handling
Grading/Evaluation
Indiana Online does not assign letter grades, grant credit for courses, nor issue transcripts or diplomas. A final score reported as a percentage of total points earned will be sent to students upon completion of a course. Your school of record can also access this score within the Student Information System, Genius. The final score will be shown as a percentage in Canvas and Genius. The student’s school of record will determine the letter grade based on their specific grading scale.
Students must complete at least 70% of the course and take all parts of the final exam(s) to have a score reported to their school of record. Failure to meet these requirements will result in a score of 0 reported to the school of record.
Assessments
Online assessments consist of formative and summative assessments represented by computer-graded multiple choice, teacher-graded writing assignments including hands-on projects, model building and other forms of authentic assessments. The course includes the minimum number of assessments
- 7 Discussion
- 9 Assignments
- 9 Quizzes
The assessments for this asynchronous course are weighted as follows
| Assessments | Percentage of Final Grade |
|---|---|
| Coursework (Discussions, Assignments, and Quizzes) | 80% |
| Final Exam | 20% |
| Total | 100% |
Teacher Contact Response Time
Students can use email or the private message system within Genius or Canvas to access highly qualified teachers when they need teacher assistance. Students will also receive feedback on their work inside Canvas. The Teacher Information page of their course may describe additional communication options.
The teacher will respond to student inquiries (email, text, call) within one business day. Assignments will be graded and posted within two business days.
Expectations for Academic Conduct
Student Handbook
It is your responsibility to read the student handbook to understand all aspects of taking an online course including expectations for academic conduct. Contact your teacher if you have any questions.
Assistance for Students with Accommodations
Indiana Online supports an inclusive learning environment for all students. If there are aspects of the instruction or design of this course that hinder your full participation, such as inaccessible web content, or the use of non-captioned videos and podcasts, reasonable accommodations can be arranged.
Technology
Technology Requirements
Students are required to have a computer device with headphones, a microphone, webcam, up-to-date Chrome Web Browser, and access to YouTube. Please review Indiana Online’s Technology Requirements.
Technical Skills Needed
Basic technology skills necessary to locate and share information and files as well as interact with others in a Learning Management System (LMS), include the ability to
- download, edit, save, convert, and upload files
- download and install software
- use a messaging service similar to email
- communicate with others in online discussion or message boards, following basic rules of netiquette
- open attachments shared in messages
- create, save, and submit files in commonly used word processing program formats and as a PDF
- save a file as a .pdf
- copy and paste and format text using your mouse, keyboard, or an html editor’s toolbar menu
- insert images or links into a file
- search for information within a document using Ctrl+F or Command+F keyboard shortcuts
- work in multiple browser windows and tabs simultaneously
- activate a microphone or webcam on your device, and record and upload or link audio and/or video files
- use presentation and graphics programs
- follow an online pacing guide or calendar of due dates
- use spell-check, citation editors, and tools commonly provided in word processing tool menus
- create and maintain usernames and passwords
Technical Questions? Please contact the Indiana Online Helpdesk.
Details
Department
Computer, Business, and Technical Education
School Level
High School
Recommended Grade
10, 11, 12
IDOE Course Code
7178
Required Prerequisites
Principles of Computing; Cybersecurity Fundamentals
Recommended Prerequisites
Advanced Cybersecurity Semester 1
NCAA Approved
N/A : Non-Core
Course Type
ASYN
Course Offered
SY, TRI, SUM
Note
Summer is only ASYN