Wildcats Tech Logo

Wildcats Tech

FPHS Computer Science

💼 7 Core IT Topics
🎯 Career-Ready Skills
🔐 Industry Standards
💻 Hands-On Practice
Careers Hardware Networking Security Operating Systems Programming Projects

💼 Unit 1: Career Exploration & Employability Skills

Discover IT careers, build professional skills, and plan your future in technology.

🎯 IT Career Pathways

+
Popular IT Careers in Alabama:
💻 IT Support Specialist

What they do: Help users with technical problems, install software, troubleshoot hardware

Education: Associate's or certifications

Salary: $40,000-$55,000/year

Certifications: CompTIA A+, Network+

👨‍💻 Software Developer

What they do: Design, code, and test applications and systems

Education: Bachelor's in CS or bootcamp

Salary: $70,000-$110,000/year

Skills: Python, Java, JavaScript, Git

🔌 Network Technician

What they do: Install, maintain, and troubleshoot network infrastructure

Education: Associate's or certifications

Salary: $45,000-$65,000/year

Certifications: CompTIA Network+, CCNA

🔐 Cybersecurity Analyst

What they do: Protect systems from threats, monitor security, respond to incidents

Education: Bachelor's in Cybersecurity

Salary: $75,000-$120,000/year

Certifications: Security+, CEH, CISSP

☁️ Cloud Engineer

What they do: Design and manage cloud infrastructure (AWS, Azure, Google Cloud)

Education: Bachelor's in IT/CS

Salary: $85,000-$140,000/year

Certifications: AWS Solutions Architect, Azure Administrator

📊 Data Analyst

What they do: Analyze data, create reports, find insights for business decisions

Education: Bachelor's in Data Science/Analytics

Salary: $60,000-$90,000/year

Skills: SQL, Python, Excel, Tableau

Job Market Trends:
  • 🔥 High Demand: IT jobs growing 13% faster than average (2020-2030)
  • 💰 Great Pay: Median IT salary $97,430 vs. $45,760 for all occupations
  • 📈 Hot Areas: Cybersecurity, Cloud Computing, AI/ML, Data Science
  • 🏠 Remote Work: Many IT jobs can be done remotely
  • 🌐 Alabama Growth: Huntsville and Birmingham tech hubs expanding rapidly

📜 Industry Certifications

+
CompTIA Certification Path:
Entry Level
CompTIA A+

Hardware, software, troubleshooting basics

📅 2 exams | 💰 $246 each | ⏱️ 90 minutes each

Intermediate
CompTIA Network+

Networking concepts, protocols, troubleshooting

📅 1 exam | 💰 $358 | ⏱️ 90 minutes

CompTIA Security+

Cybersecurity fundamentals, risk management

📅 1 exam | 💰 $404 | ⏱️ 90 minutes

Advanced
CompTIA CySA+ / PenTest+

Advanced cybersecurity analysis and testing

CISSP, CEH

Professional-level security certifications

💡 Pro Tip: Many employers pay for certification exams! Start with CompTIA A+ as a high school student - it's achievable and valuable.

🎯 Professional Skills & Resume Building

+
Essential Soft Skills for IT:
💬 Communication

Explain technical concepts to non-technical people clearly

🤝 Teamwork

Collaborate on projects, pair programming, group troubleshooting

🧩 Problem-Solving

Break down complex issues, think critically, debug systematically

👑 Leadership

Take initiative, mentor others, lead projects

⏰ Time Management

Prioritize tasks, meet deadlines, handle multiple projects

🧘 Stress Management

Stay calm under pressure, handle criticism, maintain work-life balance

Resume Tips for IT Students:
  • Skills Section: List programming languages, OS familiarity, tools you know
  • Projects: Include class projects, personal projects, GitHub repos
  • Certifications: List any completed or in-progress certifications
  • CTSO Involvement: List leadership roles in FBLA, SkillsUSA, TSA
  • Action Verbs: Use "developed," "designed," "implemented," "troubleshot"
  • Quantify: "Built website with 500+ daily visitors" vs "Built a website"
Interview Preparation:
  • Research the company and role beforehand
  • Prepare STAR stories (Situation, Task, Action, Result)
  • Practice technical questions (e.g., "Explain what an IP address is")
  • Ask thoughtful questions about the role and company
  • Follow up with a thank-you email within 24 hours

🖥️ Unit 2: Computer Basics & Hardware/Software Fundamentals

Understand how computers work from the inside out - components, software, and file systems.

⚙️ Internal Components

+
Essential Computer Components:
🧠 CPU (Central Processing Unit)

Function: "Brain" of computer - executes instructions

Key Specs: Clock speed (GHz), cores (2, 4, 8+), cache

Example: Intel Core i7, AMD Ryzen 5

💾 RAM (Random Access Memory)

Function: Temporary storage while computer is on

Key Specs: Capacity (8GB, 16GB, 32GB), Speed (DDR4, DDR5)

Rule: More RAM = more programs open at once

🗄️ Storage (HDD/SSD)

HDD: Mechanical, slower, cheaper, larger capacity

SSD: Electronic, faster, more expensive, reliable

Sizes: 256GB, 512GB, 1TB, 2TB+

🏗️ Motherboard

Function: Main circuit board connecting all components

Contains: CPU socket, RAM slots, PCIe slots, chipset

Important: Must match CPU socket type!

🎮 GPU (Graphics Processing Unit)

Function: Renders graphics, video, 3D

Types: Integrated (built-in) or Dedicated (separate card)

Use Cases: Gaming, video editing, 3D modeling

⚡ PSU (Power Supply Unit)

Function: Converts AC power to DC for components

Key Spec: Wattage (e.g., 500W, 750W)

Tip: Calculate total power needed + 20% headroom

How They Work Together:
1. PSU provides power to all components
2. CPU reads instructions from RAM
3. CPU processes instructions
4. Results stored in RAM or written to Storage
5. GPU renders output to Monitor
6. Motherboard coordinates all communication

🔌 Peripherals & Connectivity

+
Input Devices:
  • Keyboard: Types - Mechanical, Membrane, Wireless
  • Mouse: Types - Wired, Wireless, Trackpad, Trackball
  • Scanner: Converts physical documents to digital
  • Webcam: Video input for meetings, recording
  • Microphone: Audio input
Output Devices:
  • Monitor: Specs - Resolution (1080p, 1440p, 4K), Refresh Rate (60Hz, 144Hz)
  • Speakers/Headphones: Audio output
  • Printer: Types - Inkjet (color), Laser (fast, B&W), 3D
Common Ports & Connections:
USB (Universal Serial Bus)

USB-A (rectangular), USB-C (oval, reversible)

Speeds: USB 2.0 (480 Mbps), USB 3.0 (5 Gbps), USB 3.1 (10 Gbps)

HDMI / DisplayPort

Video/audio output to monitors and TVs

HDMI more common, DisplayPort better for gaming

Ethernet (RJ-45)

Wired network connection

More stable and faster than WiFi

Audio Jack (3.5mm)

Headphones, speakers, microphone

Color coded: Green (out), Pink (mic), Blue (line in)

Troubleshooting Common Hardware Issues:
  • Device not recognized: Check connections, try different port, update drivers
  • Monitor no signal: Check cable connection, verify input source, test cable
  • Computer won't turn on: Check power cable, test outlet, inspect PSU
  • Keyboard/mouse not working: Check batteries (wireless), try different port, check drivers

💿 Software Types & Licenses

+
Operating Systems (OS):
🪟 Windows

Most popular for desktops, gaming, business

Pros: Wide software support, familiar interface

Cons: Costs money, more vulnerable to malware

🍎 macOS

Apple's OS for Mac computers

Pros: User-friendly, secure, great for creative work

Cons: Expensive hardware, limited gaming

🐧 Linux

Free, open-source OS (Ubuntu, Fedora, Mint)

Pros: Free, customizable, secure, learning tool

Cons: Steeper learning curve, less gaming support

Application Software:
  • Productivity: Microsoft Office, Google Workspace, LibreOffice
  • Creative: Adobe Photoshop, GIMP, Blender
  • Communication: Zoom, Discord, Slack, Teams
  • Development: VS Code, IntelliJ, Eclipse
  • Browsers: Chrome, Firefox, Edge, Safari
Software Licenses:
✅ Open Source
  • Free to use, modify, and distribute
  • Source code is public
  • Examples: Linux, LibreOffice, GIMP, Firefox
  • Licenses: GPL, MIT, Apache
💰 Proprietary
  • Must purchase or subscribe
  • Source code is private
  • Examples: Windows, macOS, Adobe CC
  • Can't modify or redistribute
🆓 Freeware
  • Free to use but source code hidden
  • Examples: Google Chrome, Spotify (free tier)
  • May have ads or limited features

🔢 Numbering Systems

+
Number Systems in Computing:
Binary (Base-2)

Uses only 0 and 1

How computers actually work internally

Example: 1010 = 10 in decimal

Decimal (Base-10)

Uses 0-9 (what we use daily)

Natural for humans

Example: 42 = forty-two

Hexadecimal (Base-16)

Uses 0-9 and A-F

Shorthand for binary

Example: FF = 255 in decimal

Conversion Examples:
Binary to Decimal:
1010 = (1×8) + (0×4) + (1×2) + (0×1) = 10

Decimal to Binary:
13 = 8 + 4 + 1 = 1101

Hexadecimal to Decimal:
2F = (2×16) + (15×1) = 47

Decimal to Hexadecimal:
255 = (15×16) + (15×1) = FF
ASCII & Unicode:
  • ASCII: American Standard Code for Information Interchange
  • Assigns numbers to characters: A=65, B=66, a=97, 0=48
  • 128 characters total (English only)
  • Unicode: Extended character set for all languages
  • Includes emojis, symbols, 150,000+ characters
  • UTF-8 is most common Unicode encoding
🎯 Practice: Convert your age to binary! Then convert your initials to ASCII codes.

☁️ Cloud vs Traditional Computing

+
Traditional Computing:
  • Software installed locally on your computer
  • Files stored on your hard drive
  • Processing done by your CPU/RAM
  • Examples: Microsoft Word installed, local photo storage
Cloud Computing:
  • Software runs on remote servers (via internet)
  • Files stored on remote servers
  • Processing done by cloud provider's computers
  • Examples: Google Docs, Dropbox, Netflix, Gmail
Pros & Cons:
☁️ Cloud Pros:
  • Access from anywhere
  • Automatic backups
  • Easy collaboration
  • Scales easily
☁️ Cloud Cons:
  • Requires internet
  • Privacy concerns
  • Ongoing subscription costs
  • Vendor lock-in
Virtual Machines (VMs):
  • Software that simulates a complete computer
  • Run multiple OS on one physical machine
  • Used for testing, isolation, cloud servers
  • Tools: VirtualBox, VMware, Hyper-V
CLI vs GUI:
GUI (Graphical User Interface)

Windows, icons, buttons, mouse-driven

Pros: Easy to learn, visual

Cons: Slower for repetitive tasks

CLI (Command Line Interface)

Text commands, keyboard-driven

Pros: Fast, powerful, automatable

Cons: Steeper learning curve

🌐 Unit 3: Networking & Digital Communications

Learn how devices connect, communicate, and share data across networks and the internet.

🔌 Network Components & Types

+
Essential Network Components:
🌐 Router

Connects different networks together (your home to internet)

Assigns IP addresses, manages traffic

Example: Your WiFi router at home

🔀 Switch

Connects devices within same network

Directs data to correct device using MAC addresses

More efficient than a hub

🔌 Cables

Ethernet (Cat5e, Cat6): Wired networking, up to 10 Gbps

Fiber Optic: Uses light, very fast, long distance

Coaxial: Cable internet, TV

📡 Wireless Access Point (WAP)

Provides WiFi connectivity

Often built into routers

Standards: WiFi 5 (ac), WiFi 6 (ax), WiFi 7 (be)

Network Types:
🏠 LAN (Local Area Network)

Small area - home, office, school

Fast speeds, private

🌍 WAN (Wide Area Network)

Large area - cities, countries

Internet is largest WAN

📶 WLAN (Wireless LAN)

LAN using WiFi instead of cables

Example: Your home WiFi network

Internet Service Types:
  • DSL: Through phone lines, 1-100 Mbps, widely available
  • Cable: Through TV cables, 100-1000 Mbps, shared with neighbors
  • Fiber: Through fiber optic cables, 500-10,000 Mbps, fastest but limited availability
  • Satellite: From space, 12-100 Mbps, high latency, rural areas
  • 5G Home Internet: Cellular, 50-300 Mbps, new option

🔢 IP/MAC Addresses, DNS, DHCP

+
IP Addresses:
  • IPv4: 192.168.1.1 (4 numbers, 0-255)
  • IPv6: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 (longer, more addresses)
  • Public IP: Your address on the internet (assigned by ISP)
  • Private IP: Your address on local network (e.g., 192.168.x.x)
MAC Address:
  • Physical hardware address (e.g., 00:1B:44:11:3A:B7)
  • Unique to each network adapter
  • Can't change (well, can be spoofed but that's advanced)
DNS (Domain Name System):
  • Translates domain names to IP addresses
  • Example: google.com → 142.250.185.46
  • Like a phonebook for the internet
  • DNS servers: Google (8.8.8.8), Cloudflare (1.1.1.1)
DHCP (Dynamic Host Configuration Protocol):
  • Automatically assigns IP addresses to devices
  • Router typically runs DHCP server
  • When you connect to WiFi, DHCP gives you an IP
How connecting to WiFi works:
1. Device: "Can I join this network?"
2. Router (DHCP): "Sure! Your IP is 192.168.1.105"
3. Device: "What's the gateway?"
4. Router: "I'm the gateway at 192.168.1.1"
5. Device: "What's the DNS server?"
6. Router: "Use 8.8.8.8 for DNS"
7. Device: "Thanks!" [connected]

📋 Network Protocols

+
Essential Protocols:
TCP/IP (Transmission Control Protocol/Internet Protocol)

Foundation of internet communication

TCP: Ensures data arrives complete and in order

IP: Routes data between networks

HTTP/HTTPS (HyperText Transfer Protocol)

Used for loading websites

HTTP: Unencrypted (not secure)

HTTPS: Encrypted with SSL/TLS (secure!) 🔒

FTP (File Transfer Protocol)

Uploading/downloading files to/from servers

SFTP: Secure version with encryption

Used for website hosting, file sharing

SMTP/POP3/IMAP (Email Protocols)

SMTP: Sending email

POP3: Downloading email (removes from server)

IMAP: Syncing email across devices

Troubleshooting Connectivity:
1. Check Physical Connections

Cable plugged in? WiFi turned on?

2. Restart Devices

Turn off/on modem, router, computer

3. Check IP Address

Run ipconfig (Windows) or ifconfig (Linux)

4. Ping Test

ping 8.8.8.8 (tests internet)

ping google.com (tests DNS)

5. Check DNS

Try changing to 8.8.8.8 or 1.1.1.1

🛡️ Online Safety & Digital Citizenship

+
Digital Footprint:
  • Everything you do online leaves a trace
  • Posts, comments, likes, searches - all tracked
  • Future employers, colleges check social media!
  • Think before you post - it's permanent
Protecting PII (Personally Identifiable Information):
  • Never share: SSN, full birthdate, home address, passwords
  • Be careful sharing: Phone number, school name, full name
  • Privacy settings: Make social media accounts private
  • Location data: Turn off geo-tagging on photos
Cyberbullying:
  • Using tech to harass, threaten, embarrass others
  • Don't engage - block, report, tell adult
  • Save evidence (screenshots)
  • It's NEVER okay - not funny, not harmless
Mobile Device Security:
  • Screen lock: Use PIN, pattern, or biometric
  • App permissions: Only give what's needed
  • Public WiFi: Don't access banking/sensitive info
  • Updates: Keep OS and apps updated
  • Lost phone: Enable "Find My Device"
Netiquette (Internet Etiquette):
  • Be respectful - remember real people behind screens
  • Don't type in ALL CAPS (it's shouting!)
  • Think before hitting send
  • Give credit for others' work
  • Respect privacy - don't share others' info

🔐 Unit 4: Security & Ethics

Protect systems, data, and privacy while understanding ethical responsibilities in IT.

🛡️ CIA Triad & Cybersecurity Basics

+
The CIA Triad:
🔒 Confidentiality

Only authorized people access data

Methods: Encryption, passwords, access controls

Example: Medical records should be private

✅ Integrity

Data is accurate and hasn't been tampered with

Methods: Checksums, digital signatures, backups

Example: Bank balance should be exact

📍 Availability

Authorized users can access data when needed

Methods: Redundancy, backups, disaster recovery

Example: Website should be up 24/7

Common Malware Types:
🦠 Virus

Attaches to files, spreads when file is opened

Can delete files, corrupt data

🪱 Worm

Self-replicates across networks without human action

Spreads rapidly, consumes bandwidth

🐴 Trojan Horse

Disguised as legitimate software

Creates backdoor for attackers

💰 Ransomware

Encrypts files, demands payment to unlock

Major threat to businesses, hospitals

🕵️ Spyware

Secretly monitors activity, steals data

Captures passwords, browsing, keystrokes

📢 Adware

Displays unwanted ads

Annoying but less dangerous

Cryptography & Encryption:
  • Encryption: Converting data to unreadable format
  • Decryption: Converting back to readable format
  • Symmetric: Same key encrypts and decrypts (faster)
  • Asymmetric: Public key encrypts, private key decrypts (more secure)
  • Uses: HTTPS, email, messaging, file storage

🔑 Access Controls & Best Practices

+
Authentication vs Authorization:
  • Authentication: Proving who you are (login)
  • Authorization: What you're allowed to do (permissions)
  • Example: Badge gets you in building (auth), key card gets you in server room (authz)
Authentication Methods:
Something You Know

Passwords, PINs, security questions

Something You Have

Phone, security token, smart card

Something You Are

Fingerprint, face ID, retina scan

Multi-Factor (MFA/2FA)

Combines 2+ methods for extra security

Password Best Practices:
  • Length: Minimum 12 characters, longer is better
  • Complexity: Mix uppercase, lowercase, numbers, symbols
  • Unique: Different password for each account
  • Avoid: Dictionary words, personal info, patterns
  • Passphrases: "CorrectHorseBatteryStaple" > "P@ssw0rd!"
  • Password Manager: Use Bitwarden, 1Password, LastPass
  • Change when: Known breach, shared accidentally, old (1-2 years)
Additional Security Practices:
  • Firewalls: Block unauthorized network access
  • Antivirus: Scan for and remove malware
  • Updates: Install OS and software updates promptly
  • Backups: 3-2-1 rule (3 copies, 2 different media, 1 offsite)
  • VPN: Encrypt connection on public WiFi
  • Physical Security: Lock screen, secure devices, shred documents

⚖️ Ethics, Privacy Laws & Compliance

+
Important Privacy Laws:
HIPAA

Health Insurance Portability and Accountability Act

Protects medical records and health information

Violations = huge fines, possible jail time

FERPA

Family Educational Rights and Privacy Act

Protects student education records

Schools must get permission to share grades, records

GDPR

General Data Protection Regulation (Europe)

Strict data protection and privacy law

Applies to any company serving EU citizens

CCPA

California Consumer Privacy Act

Gives California residents control over personal data

Similar to GDPR but for California

Intellectual Property:
  • Copyright: Protects creative works (books, music, art, code)
  • Trademark: Protects brand names, logos
  • Patent: Protects inventions
  • Fair Use: Limited use for education, criticism, parody
  • Plagiarism: Using others' work without credit - DON'T DO IT!
Responsible AI Use:
  • Bias: AI can inherit biases from training data
  • Transparency: Be clear when AI is used
  • Accountability: Humans responsible for AI decisions
  • Privacy: Don't feed sensitive data to AI
  • Academic: Disclose AI assistance, don't claim AI work as your own
Compliance Standards:
  • NIST: National Institute of Standards and Technology - cybersecurity framework
  • ISO 27001: International standard for information security
  • PCI DSS: Payment Card Industry Data Security Standard
  • SOC 2: Security, availability, processing integrity controls
🤔 Ethical Scenario: You find a USB drive in the parking lot. It might have important files. What should you do? (Turn into IT/security, don't plug into your computer!)

🖥️ Unit 5: Operating Systems & System Maintenance

Master OS installation, configuration, maintenance, and troubleshooting.

Modules: OS Comparison, Installation & Configuration, Maintenance Tools, Troubleshooting, Database Basics

💻 Unit 6: Introduction to Programming & Data

Learn programming fundamentals, data structures, and database management.

Modules: Algorithms & Logic, Data Types, Control Structures, Functions, Simple Scripting, Database Fundamentals

🚀 Unit 7: Project-Based & Integrative Skills

Apply everything you've learned to real-world IT projects and scenarios.

🏠 Design a Secure Home Network

Plan and diagram a home network with router, switch, wireless access points, and security measures. Document IP addressing scheme and implement guest network isolation.

Skills: Networking, Security

💼 Create Your IT Career Portfolio

Build a professional portfolio website showcasing your skills, projects, certifications, and resume. Include case studies of problems you've solved.

Skills: Web Development, Professional Skills

🛠️ Build & Configure a Computer

Assemble a PC from components, install Linux, configure network settings, implement security hardening, and document the process.

Skills: Hardware, OS, Documentation

🔐 Security Audit & Recommendations

Analyze security posture of a home or small business network. Identify vulnerabilities and create detailed recommendations with implementation plan.

Skills: Security, Analysis, Communication

📚 Additional Resources

🎓 Certifications

  • CompTIA - A+, Network+, Security+
  • Cisco - CCNA certification
  • TestOut - Practice labs and courses

💻 Practice Labs

📖 Learning Platforms

🔧 Tools & Software