Skip to content

Cybersecurity Merit Badge Requirement Checklist

Scout: _____ Counselor: _____

Use this checklist to track completion. Always refer to the official current requirements from Scouting America for final sign-off.


1. Safety

  • [ ] 1(a). Viewed the Personal Safety Awareness “Digital Safety” video.
  • [ ] 1(b). Explained how to protect digital footprint and showed privacy settings.
  • [ ] 1(c). Discussed first aid/prevention for screen-related injuries and safe device use while moving.

Notes:




2. Ethics

  • [ ] 2(a). Related three points of the Scout Law to online behavior.
  • [ ] 2(b). Discussed ethical vs unethical behavior for situations like unlocked devices, observed passwords, insecure websites.

Notes:




3. Fundamentals

  • [ ] 3(a). Described three types of computer systems that need protecting and why.
  • [ ] 3(b). Explained the CIA Triad (Confidentiality, Integrity, Availability).

Notes:



4. Cyber Threats, Vulnerabilities, and Attacks

  • [ ] 4(a). Defined vulnerability, threat, and exploit, with examples.
  • [ ] 4(b). Researched one type of malware and explained how it works.
  • [ ] 4(c). Identified two risks of using public Wi-Fi and how to reduce them.
  • [ ] 4(d). Described spoofing and phishing and how to respond.
  • [ ] 4(e). Completed one current events or media option (4(e)(1) or 4(e)(2)).
  • [ ] 4(f). Created a list of personal attack surface items.

Notes:




5. Cyber Defenses

  • [ ] 5(a). Described three technologies used to defend a computer or network.
  • [ ] 5(b)(1). Explained the importance of installing updates.
  • [ ] 5(b)(2). Demonstrated how to check, install, and verify updates.
  • [ ] 5(c). Completed three of the system security tasks (5(c)(1)–5(c)(9)).
  • [ ] Task 1: _
  • [ ] Task 2: _
  • [ ] Task 3: _

Notes:



6. Cryptography

  • [ ] 6(a). Explained three situations where encryption is used, with types and importance.
  • [ ] 6(b). Showed how to know if a website connection is encrypted.
  • [ ] 6(c). Completed one of 6(c)(1)–6(c)(4).

Notes:



7. Connected Devices and IoT

  • [ ] 7. Described four internet-connected devices, why connectivity is useful, risks, and protections.

Notes:



8. Cybersecurity Activities

Completed one of:

  • [ ] 8(a). Learned about a competition, camp, or activity and reported to counselor.
  • [ ] 8(b). Participated in a cybersecurity competition (designed or existing).
  • [ ] 8(c). Gave a presentation with at least one demo/hands-on activity.

Notes:



9. Careers

Completed one of:

  • [ ] 9(a). Researched three cybersecurity careers and details for one.
  • [ ] 9(b). Visited a business/organization that does cybersecurity work and reported on roles and training.

Notes:




Counselor Signature: ____ Date: ___