Cybersecurity Merit Badge Requirements
Learn about digital safety, ethical computing, cybersecurity fundamentals, threat analysis, encryption, and protecting systems from attacks to earn this merit badge.

Requirements
-
Copy link to requirement 1Safety. Do the following:
-
Copy link to requirement 1.aView the Personal Safety Awareness “Digital Safety” video (with your parent or guardian’s permission).
-
Copy link to requirement 1.bExplain to your counselor how to protect your digital footprint, such as while using social media, mobile device apps, and online gaming. Show how to set privacy settings to protect your personal information, including photos of yourself or your location.
-
Copy link to requirement 1.cDiscuss first aid and prevention for potential injuries, such as eye strain, repetitive injuries, and handling electronics devices, that could occur during repeated use. Discuss how to keep yourself physically safe while using a mobile device (for example while walking or biking).
-
Copy link to requirement 1.a
-
Copy link to requirement 2Ethics. Do the following:
-
Copy link to requirement 2.aRelate three points of the Scout law to things people do on the internet or with computers, phones, and other connected electronic devices.
-
Copy link to requirement 2.bDiscuss with your counselor examples of ethical and unethical behavior in cyberspace. Include how to act responsibly when you encounter situations such as: coming across an unattended or unlocked computer or mobile device; observing someone type their password or seeing it written down near a computer; or discovering a website that is not properly secured. Explain why these situations require good judgement, and how the Scout Law and personal values should guide your actions.
-
Copy link to requirement 2.a
-
Copy link to requirement 3Fundamentals. Do the following and discuss each with your counselor:
-
Copy link to requirement 3.aDescribe three types of computer systems that need protecting and explain why.
-
Copy link to requirement 3.bExplain the “C.I.A. Triad”—Confidentiality, Integrity, and Availability—and why these three principles are fundamental to cybersecurity.
-
Copy link to requirement 3.a
-
Copy link to requirement 4Cyber Threats, Vulnerabilities, and Attacks. Do the following and discuss each with your counselor:
-
Copy link to requirement 4.aDefine the terms vulnerability, threat, and exploit, and give an example of each that might apply to a website or software product you use.
-
Copy link to requirement 4.bPick one type of malware (such as virus, worm, Trojan, backdoor, spyware, or ransomware) and find out how it works. Explain what it does and the harm it can cause.
-
Copy link to requirement 4.cIdentify two risks of using public Wi-Fi and describe how to reduce or avoid those risks.
-
Copy link to requirement 4.dDescribe what spoofing and phishing are, and how to recognize a message or website that might be trying to trick you. Explain what steps you should take to protect yourself and others if you come across one.
-
Copy link to requirement 4.eCurrent Events. Do ONE of the following:
-
Copy link to requirement 4.e.1Read an article or a news report about a recent cybersecurity incident, such as a data breach or malware infection. Explain how the incident happened (to the best of your ability based on the information available) and what the consequences are or might be to the victim.
-
Copy link to requirement 4.e.2With your parent or guardian’s permission, watch a movie or read a book in which cybersecurity plays a significant role. Discuss how cybersecurity topics were depicted and how realistic you think it was.
-
Copy link to requirement 4.e.1
-
Copy link to requirement 4.fCreate a list of what is part of your cyber attack surface including all the ways someone could try to access your personal information or devices—such as online accounts, apps, or home networks. Resource: What Is an Attack Surface? | Cybersecurity Explained in 60 Seconds (video)
-
Copy link to requirement 4.a
-
Copy link to requirement 5Cyber Defenses. Do the following:
-
Copy link to requirement 5.aDescribe three technologies that are used to defend a computer or network, such as access controls, antivirus software, firewall, intrusion detection/prevention systems, and Virtual Private Network.
-
Copy link to requirement 5.bInstalling updates. Do the following:
-
Copy link to requirement 5.b.1Explain to your counselor the importance of installing the latest updates on your computer, why they are needed, and what kinds of problems they can prevent.
-
Copy link to requirement 5.b.2Demonstrate to your counselor how to check for, download, and install the latest updates for your computer or mobile device, or another computer you have permission to use (if you are unable to do this on your computer, you may use an online guide with screenshots to demonstrate this). Show your counselor how to verify that your computer or mobile device is up-to-date. Resource: Keep Your Device’s Operating System and Applications Up to Date | CISA (website)
-
Copy link to requirement 5.b.1
-
Copy link to requirement 5.cSystem security. With your parent or guardian’s permission, do THREE of the following using a computer or mobile device, and discuss with your counselor:
-
Copy link to requirement 5.c.1Describe what makes a good password and why. Set or change an account password to one that is “strong.”
-
Copy link to requirement 5.c.2Describe multi-factor authentication (MFA) and how it can be used to improve security. Demonstrate how to use an authenticator app or other MFA function.
-
Copy link to requirement 5.c.3Install and set up a password manager. Demonstrate how it works to your counselor. Resource: Yes, You Need a Password Manager. Here’s Why | Khan Academy (website)
-
Copy link to requirement 5.c.4Run a virus scan. Show the results to your counselor.Resources:
- Understanding Anti-Virus Software | CISA (website)
- Ensure Your OS Antivirus and Anti-Malware Protections are Active | CISA (website)
- How to Start a Scan for Viruses or Malware in Microsoft Defender - Microsoft Support (website)
- How to Run a Virus Scan on Windows 11: A Step-by-Step Guide - Solve Your Tech (website)
- How to Scan an Android Phone for Malware - Android Authority (website)
- MalwareBytes Free Virus Scanner (website)
- Free Online Virus Scan | Trend Micro HouseCall | Trend Micro (US) (website)
-
Copy link to requirement 5.c.5Using a command line or other built-in tool, see what programs or processes are running on your computer. Discuss with your counselor what you see and what surprises you.Resources:
- How to View All Running Processes in Windows 10 & 11 (video)
- How to Tell What's Running in the Background on Your PC (video)
- View Information About Mac Processes in Activity Monitor - Apple Support (video)
- Kill Apps and Processes on Chromebook Using the Task Manager (video)
- How to Access Your Chromebook's Task Manager (video)
-
Copy link to requirement 5.c.6Use a command line interface to view your computer’s open network connections. Discuss the results with your counselor.
-
Copy link to requirement 5.c.7Demonstrate how to back up your data from a mobile device to a local computer or the cloud.Resources:
- How to Back Up With iCloud - Apple Support (website)
- How to Back up Your iPhone, iPad, and iPod Touch - Apple Support (website)
- iCloud Data Security Overview - Apple Support (website)
- Back Up or Restore Data on Your Android Device - Android Help (google.com) (website)
- Back Up Your Device - Android - Google One Help (website)
-
Copy link to requirement 5.c.8Research best practices for protecting a home computer or network, and make a checklist of FIVE things you and your family can do to stay secure.
-
Copy link to requirement 5.c.9Identify one or more other vulnerabilities on your home computer or network or another computer or network you have permission to use and discuss with your counselor. With permission from the system owner, take the necessary actions to fix it.
-
Copy link to requirement 5.c.1
-
Copy link to requirement 5.a
-
Copy link to requirement 6Cryptography. Do the following:
-
Copy link to requirement 6.aResearch and explain to your counselor three situations where encryption is used in cybersecurity. For each situation, describe what kind of encryption is used and why it is important.
-
Copy link to requirement 6.bShow how you can know if your connection to a website is encrypted.
-
Copy link to requirement 6.cDo ONE of the following:
-
Copy link to requirement 6.c.1Create your own encryption code, such as a substitution cipher or code book, and demonstrate using it to encrypt and decrypt a message. Describe the strengths and weaknesses of your code.
-
Copy link to requirement 6.c.2Download and set up an app (from an official app store) that uses end-to-end encryption. Explain to your counselor what this means, how it works, and why it is more secure than other forms of communication (e.g. SMS).
-
Copy link to requirement 6.c.3Use a hashing tool (for example, using SHA or MD5) to create a checksum for a file, document, or piece of text. Have a fellow Scout or your counselor make a change to it, then recreate the checksum and compare the new checksum to the original as a demonstration of file integrity checking.
-
Copy link to requirement 6.c.4Create your own PGP (pretty good privacy) email key. Share your public key with others (and your counselor). Also, get their public keys and add them to your computer’s key ring. Send a message that has been digitally encrypted.
-
Copy link to requirement 6.c.1
-
Copy link to requirement 6.a
-
Copy link to requirement 7Connected Devices and Internet of Things (IoT). Describe to your counselor four electronic devices you encounter that could be connected to the internet, why this connectivity can be useful, what risks are posed by the connectivity, and how they could be protected.
-
Copy link to requirement 8Cybersecurity Activities. Do ONE of the following:
-
Copy link to requirement 8.aLearn about a cybersecurity competition, camp, or other activity you could participate in (either now or in the future). Share what you learned with your counselor, including the type of activity, time commitment, and age of participants.
-
Copy link to requirement 8.bParticipate in a cybersecurity competition with members of your troop, school, or some other group approved by your counselor. Either design your own competition or use an existing platform.
-
Copy link to requirement 8.cGive a presentation to your patrol, troop, or another group approved by your counselor, on a cybersecurity topic of your choice. Your presentation must include at least one demonstration and/or hands-on activity.
-
Copy link to requirement 8.a
-
Copy link to requirement 9Careers. Do ONE of the following:
-
Copy link to requirement 9.aIdentify three career opportunities that would use skills and knowledge in cybersecurity. Pick one and research the training, education, certification requirements, experience, and expenses associated with entering the field. Research the prospects for employment, starting salary, advancement opportunities and career goals associated with this career. Discuss what you learned with your counselor and whether you might be interested in this career.Resources:
- Career Exploration Cards | Cyber.org (PDF)
- Degrees & Certifications | Cyber.org (website)
- Information Security and Forensics Analyst | What I Do (video)
- Careers in Cybersecurity: CompTIA's Future of Tech (website)
- Military Cybersecurity Careers & Training | Cybermission (website)
- NCF Panel Discussion about Cybersecurity Careers | #CyberChats (podcast)
-
Copy link to requirement 9.bVisit a business or organization that does work in cybersecurity. Find out about different work roles, what they do, and how they acquired their knowledge through college degrees or certifications. Share what you learned with your counselor.
-
Copy link to requirement 9.a