Cybersecurity Merit Badge Requirement Checklist
Scout: _____ Counselor: _____
Use this checklist to track completion. Always refer to the official current requirements from Scouting America for final sign-off.
1. Safety
- [ ] 1(a). Viewed the Personal Safety Awareness “Digital Safety” video.
- [ ] 1(b). Explained how to protect digital footprint and showed privacy settings.
- [ ] 1(c). Discussed first aid/prevention for screen-related injuries and safe device use while moving.
Notes:
2. Ethics
- [ ] 2(a). Related three points of the Scout Law to online behavior.
- [ ] 2(b). Discussed ethical vs unethical behavior for situations like unlocked devices, observed passwords, insecure websites.
Notes:
3. Fundamentals
- [ ] 3(a). Described three types of computer systems that need protecting and why.
- [ ] 3(b). Explained the CIA Triad (Confidentiality, Integrity, Availability).
Notes:
4. Cyber Threats, Vulnerabilities, and Attacks
- [ ] 4(a). Defined vulnerability, threat, and exploit, with examples.
- [ ] 4(b). Researched one type of malware and explained how it works.
- [ ] 4(c). Identified two risks of using public Wi-Fi and how to reduce them.
- [ ] 4(d). Described spoofing and phishing and how to respond.
- [ ] 4(e). Completed one current events or media option (4(e)(1) or 4(e)(2)).
- [ ] 4(f). Created a list of personal attack surface items.
Notes:
5. Cyber Defenses
- [ ] 5(a). Described three technologies used to defend a computer or network.
- [ ] 5(b)(1). Explained the importance of installing updates.
- [ ] 5(b)(2). Demonstrated how to check, install, and verify updates.
- [ ] 5(c). Completed three of the system security tasks (5(c)(1)–5(c)(9)).
- [ ] Task 1: _
- [ ] Task 2: _
- [ ] Task 3: _
Notes:
6. Cryptography
- [ ] 6(a). Explained three situations where encryption is used, with types and importance.
- [ ] 6(b). Showed how to know if a website connection is encrypted.
- [ ] 6(c). Completed one of 6(c)(1)–6(c)(4).
Notes:
7. Connected Devices and IoT
- [ ] 7. Described four internet-connected devices, why connectivity is useful, risks, and protections.
Notes:
8. Cybersecurity Activities
Completed one of:
- [ ] 8(a). Learned about a competition, camp, or activity and reported to counselor.
- [ ] 8(b). Participated in a cybersecurity competition (designed or existing).
- [ ] 8(c). Gave a presentation with at least one demo/hands-on activity.
Notes:
9. Careers
Completed one of:
- [ ] 9(a). Researched three cybersecurity careers and details for one.
- [ ] 9(b). Visited a business/organization that does cybersecurity work and reported on roles and training.
Notes:
Counselor Signature: ____ Date: ___