Cybersecurity II Higher Education Program
Prepare students for the Cisco® Certified Support Technician, Cybersecurity Exam. Introduce students to key concepts and practices in cybersecurity, including access management, network security, risk assessment, and digital forensics. Students gain the practical skills to respond to cybersecurity incidents and comply with regulatory frameworks.
In Cybersecurity II, students will:
- Identify and mitigate common cybersecurity threats and vulnerabilities
- Apply access management principles and endpoint security strategies
- Develop and execute disaster recovery and business continuity plans
- Prepare for industry-recognized certification
Cybersecurity II Program for Higher Education
Prepare students to apply their cybersecurity skills to IT careers.
Certification Prep
This course prepares students for success on the Cisco® Certified Support Technician, Cybersecurity Exam. With course curriculum aligned to certification objectives, students get everything they need to excel on certification exams and earn resume-boosting credentials.

Turnkey Career Education
Ready-to-use programs in high-demand and emerging fields allow institutions to adapt quickly and meet the growing demand for industry credentials.

Interactive Learning Students Love
Grounded in educational research, each course maximizes student engagement with relevant content, real-world projects, discussion boards, videos, and more.
Ready for the Real World
Students become career ready when they go beyond understanding concepts to applying them in real life. Through practical activities, students gain the skills they need for in-demand careers.
Ignite a passion for Information Technology and equip students with cybersecurity skills.
-
Course Outline
-
Module Introduction
-
Interactive Instructional Design
-
Formative and Summative Assessments
-
Accessibility
Course Outline by Module
-
- Module 1: Essential Security Principles
- Module 2: Access Management Principles
- Module 3: Basic Network Security Concepts
- Module 4: Endpoint Security Concepts Part I
- Module 5: Endpoint Security Concepts Part II
- Module 6: Vulnerability Assessment and Risk Management Part I
- Module 7: Vulnerability Assessment and Risk Management Part II
- Module 8: Incident Handling
Module Introduction
-
Module Introduction Video and DescriptionEach module begins with an introductory video where the instructor sets the stage for topics and learning objectives for the upcoming module. The video is followed by a short description of the module content.
-
Module Learning ObjectivesEach module introduction includes the set of learning objectives for students to review prior to beginning instruction.
-
Polling QuestionStudents engage with an interactive poll related to the upcoming module content. After completing the poll, students can see how their peers responded with a percentage breakdown of the results.
-
Introduce New VocabularyThe module introduction concludes with an interactive vocabulary matching activity, designed to familiarize students with words and concepts they will learn in the upcoming module.
Interactive Instructional Design
-
Engaging Lesson VideosEach lesson begins with an instructional video from an expert educator, designed to grab students’ attention while addressing learning objectives.
-
Interactive ReadingEach lesson video is followed by an interactive reading where students dive into new material with embedded interactives like hot spots, flip cards, slides, videos, and more!
-
Integrated ActivitiesActivities are embedded purposefully between lessons and incorporate a variety of interactive tools for students to practice what they’ve learned.
-
Project-Based LearningEnd-of-module projects provide the opportunity for students to apply what they’ve learned to a real-world situation that they would encounter in the workforce.
Formative and Summative Assessments
-
Concept CheckEmbedded concept checks include a variety of low-stakes activities, including short answer responses, matching, flashcards, and sorting.
-
Discussion-based ReflectionsThought-provoking discussion prompts invite students to process and share their learning with their peers. Utilize your LMS discussion board or have students work in an individual course journal.
-
Short Answer AssignmentsShort answer assignments are included at the end of each module, providing an opportunity for students to analyze and apply their learning to a real-world situation. Students are supplied with a detailed assignment rubric with clear expectations.
-
Module QuizzesEach module concludes with a quiz, assessing student understanding. Quizzes are auto-scored and the results report back to the teacher’s gradebook in their LMS.
-
Final ExamA comprehensive final exam assesses student skills and knowledge at the end of the course. The final exam is auto-scored and the results report back to the teacher’s gradebook in their LMS.
Accessibility
-
Text-to-SpeechAudio features allow greater accessibility for students. Highlight any text within the course to have it read out loud, including image alt text.
-
Language TranslationsTranslate any text within the course, including video transcripts, into 60+ languages. Additionally, many language translations can be read out loud using the text-to-speech feature.
-
Closed CaptioningAll videos within the course include closed captioning with the ability to access video transcripts and translate into 60+ languages.
-
Alternative ActivitiesAlternative activities are embedded throughout lessons to meet accessibility standards and provide alternatives to the interactive activities in multiple choice format.
Explore Cybersecurity II content to promote learning.
Course Preview
Get a sneak peek into the Cybersecurity II course, featuring key learning highlights.

Digital Tour
Experience the engaging instructional design and learn about system integrations.
Delivered Right in your LMS
Simple. Seamless. Scalable.
Enjoy easy access to career education programs that integrate directly with Canvas, Blackboard, Moodle, and other major LMS platforms.
Additional Cybersecurity II Resources
-
Blended Learning Guide
-
Pacing Guide
-
Answer Keys
-
Course Syllabus
-
On-Demand Training
Blended Learning Guide
Provides teachers with robust support for planning and implementing the course in a traditional classroom, including best practices for blending face-to-face and online learning activities.
- Step-by-step teaching support for each lesson
- In-class discussion prompts
- Suggestions for independent, small group, and whole class instruction
- Facilitation support and student work samples for projects
- Sample student responses for reflections and short answer assignments

Pacing Guide
Provides a tool for teachers to appropriately assign coursework and allocate time on a weekly basis for completing a course within a semester or year long time frame.

Answer Keys

Course Syllabus
The syllabus includes a high-level course overview, module overviews, and module learning objectives.

On-Demand Training

Frequently asked questions about Cybersecurity II
-
What modules are covered in this course?
- Module 1: Essential Security Principles
- Module 2: Access Management Principles
- Module 3: Basic Network Security Concepts
- Module 4: Endpoint Security Concepts Part I
- Module 5: Endpoint Security Concepts Part II
- Module 6: Vulnerability Assessment and Risk Management Part I
- Module 7: Vulnerability Assessment and Risk Management Part II
- Module 8: Incident Handling
-
Does this course align to any industry certifications?Yes. Cybersecurity II prepares students for success on the Cisco Certified Support Technician, Cybersecurity Exam.
-
Is this program available in print or digitally?Cybersecurity II is a robust, digital-only course ideal for virtual or blended learning.
-
What faculty resources are available?Faculty resources include the course syllabus, pacing guide, answer keys, blended learning guide, and digital courseware access. Additionally, an on-demand, self-paced teacher training course covers the fundamentals of implementing the curriculum.
-
Which Learning Management System (LMS) does this course integrate with?Digital courseware is delivered on the award-winning Savvas Realize platform, which can integrate with: Google Classroom, Canvas®, Schoology®, Blackboard®, Moodle®, AGILIX® Buzz®, and D2L.
-
What are the digital license options?Course digital access can be purchased for 1 year.
-
How long does it take to complete the course?Cybersecurity II is designed to support a full-credit course and therefore may be used to support a semester- or year-long option. On average, this course requires 80 instructional seat-time hours, equating to roughly 3–4 lessons per week. Teachers can make course customizations if desired to meet specific needs.