CCS_color bar.PNG codingcyber2.JPG

Subscribe to our interest list and receive monthly updates. Please note that the subscribe updates are on hiatus until August, 2019.

subscriberegular.JPG

Any questions? Contact Rhonda Spradling, College & Career Services Coordinator, at rhonda.spradling@asd20.org.



NEWS & EVENTS

2019-20 PROGRAM APPLICATION

The Coding & Cybersecurity program application window is open! View the Information Session Slide Deck

CandCapply.PNG


APRIL 12, 2019
A VISIT FROM DR. BARRY FAGIN FROM THE USAFA & THE INFAMOUS ENIGMA MACHINE

Coding and cybersecurity students had the opportunity to learn about one of the real, working WWII Enigma machines and try sending coded messages through it.

IMG_1746.JPG      IMG_2051.JPG



ABOUT THE CODING & CYBERSECURITY PROGRAMS


EXTENDED AND FLEXIBLE LEARNING OPPORTUNITIES

ICicon.JPG

INDUSTRY CERTIFICATIONS
Students may be prepared to earn industry-standard certifications that will demonstrate skills and knowledge to potential employers.

gradicon.JPG

COLLEGE CREDIT
Students have the option to earn college credit to accelerate their college experience.


teamicon.JPG
MENTORSHIPS & INTERNSHIPS

Students work with industry mentors who volunteer in the classroom and have opportunities to apply for professional internships.



classroom2.PNG

Students who participate in a pathway at The Center for Modern Learning are not just taking a class or two or collecting college credits: our students are immersed in the culture of technology alongside a culture of innovation and entrepreneurial ideas. Students are integral to shaping the direction of the pathways while they make connections with industry professionals. The project-based learning environment infuses the curriculum with relevancy, providing a rich learning experience for students who have just finished programming 1 all the way to students who have completed AP Computer Science.​

View Computer Science and Cybersecurity Resources for Parents & Students



ELIGIBILITY

Applications will be accepted for students who...

  • Will be in 11th or 12th grade in the fall of 2019;

  • Are enrolled in a D20 high school;

  • Are on track for graduation;

  • Have fewer than ten full-day absences in the 2018-19 SY; and

  • Have successfully completed one of the following pre-requisite options:

    • High school computer programming class.

    • College computer systems/information technology class.

    • Programming mini-course (offered online, April - May)

    • Cybersecurity one-week summer camp.

    • Skills assessment.

Students may be placed into Year 1 or Year 2 depending on their credentials. Generally, a student who has completed Cybersecurity 1, Coding & Design Thinking 1, or AP Computer Science will be placed in Year 2.
 


APPLICATION PROCESS

application.JPG
 


LOCATION & SCHEDULE

 

Classes are held at The D20 Center for Modern Learning, a new building at the intersection of Research Parkway and Black Forest Road. All Coding and Design Thinking and Cybersecurity courses are double-block classes that meet for approximately 180 minutes every other day, so students can plan on being at The Center for Modern Learning for a half day on an alternating block schedule. All other times students are at their primary high school. High school counselors will help to build each student schedule so that it aligns with the student's needs and goals.

schedulecandc.PNG

After school opportunities include our Cybersecurity Student Organization with CyberPatriots and outreach teams (students who are mentors for elementary school kids)


 

 

COURSE, CREDIT, & CERTIFICATION OPPORTUNITY MAP


​Class High School Credits ​College Credit Options
(with cost to students)
​College
Certification Options (with cost to students)
​Coding & Design Thinking 1
​4 weighted core elective credits
​6 credits:
CS 1150 - Principles of Computer Science ($100)
CS1450 - Data Structures and Algorithms ($100)

College credit is earned second semester and is OPTIONAL
​University of Colorado - Colorado Springs
​None
​Cybersecurity 1
​4 weighted core elective credits
​9 credits:
CNG 260 - CISCO Network Associate 1 ($10)

College credit is earned both semesters and is OPTIONAL. Students must earn a B- or higher to be eligible for college credit.

​Pikes Peak Community College
CompTIA Network+ ($100)
CISCO Routing & Switching ($100)

Attempting an industry certification is OPTIONAL
​Coding & Design Thinking 2
​4 weighted core elective credits
​TBD ​University of Colorado - Colorado Springs
​Microsoft C# ($100)

Attempting an industry certification is OPTIONAL
​Cybersecurity 2
​4 weighted core elective credits
​TBD
​Pikes Peak Community College
​Network+ ($100)
Security+ ($100)

Attempting an industry certification is OPTIONAL
 ​ ​ 


 

LEARNING OBJECTIVES


CODING & DESIGN THINKING

Students build on foundational programming skills and use current coding methodologies for computer problem solving to design and construct innovative, real-world technology solutions.

YEAR 1

  • Explain ideas behind computational and design thinking to analyze problems and build relevant coding solutions that accommodate specified requirements and constraints.

  • Apply creative aspects of programming, abstractions, algorithms, large data sets, the internet, and global computing impacts to code systems that can interact with people and the environment.

  • Apply the essentials of object-oriented and/or functional programming language to programs.

  • Extend proficiency with a modern computer programming language to develop and test applications, games, and other programs.

  • Work fluidly with computer systems and environments, using programming debuggers, editors, and file systems.

  • Explain and apply concepts of programming, including data type, data abstraction, data structure, large data analyses, linear searches, and binary searches.

  • Collaborate effectively as a member of a project team to meet a deadline-driven goal.

  • Write and follow documented processes that include graphics as a way to communicate complex information for a variety of audiences and purposes.

  • Use software development and project management processes in the completion of a software application.

  • Integrate relevant standards, ethical considerations, and an understanding of legal and privacy issues in designing software applications and IT systems.

YEAR 2

  • Apply more advanced forms of programming, including applications on the cloud, to create fast and efficient applications.

  • Explain the ideas behind computational and design thinking to analyze problems and build relevant coding solutions that accommodate
    specified requirements and constraints.

  • Apply software engineering practices to existing and new projects.

  • Collaborate effectively as a member of a project team to meet a deadline-driven goal in the agile development process.

  • Apply computer science knowledge and skills to solve problems effectively and efficiently.

  • Conduct tests to refine and justify solutions, and analyze data to evaluate those solutions

  • Write and follow documented processes that include graphics as a way to communicate complex information for a variety of audiences and purposes.

  • Apply concepts of artificial intelligence to application development.

  • Program for the web with consideration of best practices in design to include user interface, user research, and user experience protocols.

  • Engage in work-based learning opportunities that may include real-world projects, job-shadows, internships, and mentorships.

  • Integrate relevant standards, ethical considerations, and an understanding of legal and privacy issues in designing software applications and IT systems.

CYBERSECURITY

Students apply concepts of data security, system administration, network administration, and programming to the study of cybersecurity. Through critical thinking, investigation of real-world issues and practical exercises, students will refine cybersecurity skills. Students will adhere to and demonostrate computer security ethics.

YEAR 1

At the end of this course, students will be able to design, manage, and evaluate operating systems and networks in order to prevent cybersecurity attacks and mitigate cybersecurity threats. Students will…

  • Describe computer operating systems and how they bridge the hardware/software gap.

  • Compare modern operating systems in terms of their susceptibility to security vulnerabilities, suitability for various tasks and other evaluation criteria.

  • Install and configure the Linux operating system, and use the Linux command line to effectively administer a Linux computer system.

  • Apply file system knowledge to securing access to files.

  • Describe the processes that occur during computer boot-up and how these processes impact the security of a system.

  • Configure networking components of a Linux system to balance availability with security.

  • Use command-line scripting to automate routine system administration tasks.

  • Identify the common network models and be able to use them to describe a real-world network scenario.

  • Identify common network topologies and communicate pros and cons of each.

  • Describe wired and wireless network technologies and how they are commonly implemented.

  • Install, configure, administer and troubleshoot a basic wired or wireless network.

  • Use common and advanced TCP/IP network applications and concepts to secure TCP/IP networks.

  • Analyze the future of TCP/IP networks (IPv6) and why networks are evolving in that direction.

  • Evaluate and select an appropriate programming or scripting language to automate routine system and network administration tasks.

  • Use a programming language to automate routine system, network administration and data manipulation tasks.

  • Integrate relevant standards, ethical considerations, and an understanding of legal and privacy issues in designing software applications and IT systems.

YEAR 2

  • Describe basic switching concepts.

  • Describe enhanced switching technologies such as VLANs, VTP, RSTP and PVSTP.

  • Configure and troubleshoot a small switched network.

  • Describe purpose, nature and operations of a router, routing table and route lookup process.

  • Configure and verify static and default routing.

  • Describe dynamic routing protocols, distance vector routing protocols and link state routing protocols.

  • Configure and troubleshoot basic routing protocols such as RIP and single-area OSPF.

  • Describe the purpose and types of access control lists (ACLs).

  • Configure and troubleshoot ACLs for IPv4 and IPv6.

  • Describe the operations and benefits of DHPC and DNS for IPv4 and IPv6.

  • Describe the operations and benefits of NAT.

  • Configure and troubleshoot NAT.

  • Evaluate and select an appropriate programming or scripting language to automate routine system and network administration tasks.

  • Integrate relevant standards, ethical considerations, and an understanding of legal and privacy issues in designing software applications, administering, and troubleshooting IT systems.

  • Assume leadership roles in the area of cybersecurity awareness and education in the D20 community.



The details here reflect the most current information we have and is subject to change. Please subscribe to receive updates or check back on this web page for further details!