Networks and the Internet
89 lessons found.
"So, you want to work for the DNI"
This is an introduction to the CyberSecurity aspect of National Intelligence
All about the Internet
How Does the Internet Work? Learning about networks, protocols, TCP/IP
Basic aspects of Cyber security and Copyrights
Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …
Being Aware of What You Share
Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand …
Bookmarking Websites
Searching for websites can be time-consuming. Imagine having to re-discover the places where we buy our groceries or …
Can you escape the maze?
Students will use two different maze websites throughout the lesson. They will use speaking and listening skills to exit …
Candy Burglar: Password Lesson
Candy Burglar: Password Lesson Students will each receive a card with a symbol or word on it. The symbol will match with …
Careers in the Cyber World
This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …
CODIS & Forensic Science
Students will work together as forensic scientists to solve the crime of “Who broke into our school and stole all the …
CODIS & Forensic Science
Students will work together (in teams of 4) as forensic scientists to solve the crime of “Who broke into our school and …
Collaborative Grid Poster
The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …
Computer Basics (Collaborative lesson with K and 5)
5th grade students will mentor kindergarten students in how to properly care for and navigate their personal computer. …
Computer Basics (Collaborative lesson with K and 5th)
Kindergarten students will be working with 5th grade students to learn about the proper care and use of their computers. …
Create Your Own Musical Code
Different applications and disciplines often require knowledge of different communication systems and the ability to …
Creating a Strong Username and Password
This lesson will discuss the importance of using a unique username, and help create a strong password using a Caesar …
Critical Infrastructure 1
Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …
Critical Infrastructure 2
Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity
Cybersecurity - Hand Introduction and Confidentiality
Introduction to the GenCyber Hand concepts - also includes Confidentiality topics.
Cybersecurity - Integrity
Introduction to the concept of integrity with a video, unplugged activity, and discussion
Cybersecurity - Secure Passwords
Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong …
Cybersecurity 101 (4th Grade)
The teacher will introduce the topic of cybersecurity by asking students about any personal experience they have had …
Cybersecurity Career Poster Project
Students will design a poster project detailing an individual cybersecurity career. The poster project will include …
Cybersecurity: Denial of Service Attack
In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …
Darn! I forgot my password...again!
Middle School Students love to share everything-including their water bottles, their sense of humor and even their …
Darn! I forgot my password...again!
Middle School Students love to share everything-including their water bottles, their sense of humor and even their …
Darn! I forgot my password...again!
Middle School Students love to share everything-including their water bottles, their sense of humor and even their …
Denial of Service Attack
Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …
Digital Citizenship
In todays lesson we will be exploring internet privacy and security.Students learn how to protect personal information …
Digital Citizenship Escape Room
Beginning of the year introduction to digital citizenship. Students work through escape room to perform tasks. The tasks …
Discover Digital Citizenship
Students will use a decoder to decode messages that lead to exploration of Digital Citizenship resources. They will then …
Do’s and Don'ts on the internet
Introduction: “Today, we live in a time characterized by rapid technology transformation, and resulting social, …
Don't Feed the Phish (Adapted from Common Sense Media's Digital Citizenship Curriculum
This lesson helps students identify phishing attacks over networks via email, texts, and online pop-ups and ads, etc. A …
E is for Erosion, C is for Cybersecurity
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …
Ethics in Technology
Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google
Evolution of the Telephone
Students spend several periods looking at the development of communication over the past 200 years.
Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits
Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …
Future Job Research
Student is required to 'explore future occupations' as defined by Occupational Outlook Handbook at …
Gesturing for Cybersecurity
Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …
Get to Know Me
Students will participate in a community building activity that will integrate Computer Science through the use of the …
Get to Know Me
Students will participate in a community building activity that will integrate Computer Science through the use of the …
Getting started with Micro:bit
Students will explore the functions of the MIcro: bit. Students have not had experience with this and I have very …
Hardware/Software Sorting Activity
Hardware/Software Sorting Activity: For this exploration, you and your partner will sort the computer science resource …
Honesty and Integrity
Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …
Hour of Code introduction/ Ecosystems
this will be an introduction to coding using Hour of Code, as a refresher/ attention grabber right after Christmas …
How do we know if a source is reliable?
The students will analyze three different websites. During their exploration the students will answer three questions. …
How Information is Transferred Over the Internet and Internet/Database Research Search Strategies
This lesson introduces the process by which information is sent between computers and networks as packets of binary code …
How Information is Transferred Over the Internet and Internet/Database Search Strategies
Students will be introduced to the concept of data/information transfer across computer devices and the Internet, …
How safe are they?
Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …
How safe are we? ¿Qué salvo estamos?
I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …
I = Integrity
Students will locate, read and research articles from sources to better understand using credible sources for research.
Integrity and Keep It Simple
The purpose for this lesson is to help you understand the notions or aspects of integrity and the simplicity with which …
Internet Information Research and Retrieval Processes and Effective Search Strategies
This lesson will introduce the concepts of information research strategies, information storage, and retrieval systems …
Internet Safe!
Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …
Internet Safe!
Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …
Introducing our Technology
This lesson is designed to be delivered early in the year to establish a common knowledge base on the programs to be …
Introduction of Cybersecurity/ Confidentiality Availability
1. Test students' prior knowledge
Introduction to Computer Science and SpeedGeeking 101
Part 1: Gauge student understanding of computer science and introduce basic CS vocabulary. Part 2: Teach students about …
Introduction to Micro:bits
Students will learn what micro:bits are and how they can be used. They will also learn how to code their own micro:bits. …
Learning the Importance of Authentication Factors
Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use …
Lesson Plan 2-First LEGO ® League “White Energy Journey”
Students will work independently to design a ‘driving base’ using the SPIKE PRIME LEGO sets. Upon completion of the base …
Lesson Plan 3-Security Risks & Consequences
Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them. …
Malware: The Rat
With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …
Micro:bits / Makerspace
The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …
Micro:bits / Makerspace
The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …
O' is for Outlaw
Students will by studying outlaws and law enforcement in Wyoming History. We will talk about how technology has changed …
O' is for Outlaw
Students will be studying Outlaws and Law Enforcement in Wyoming History. We will talk about how technology has changed …
PE Online Resources
Students will be using their school-provided technology (whether it be an IPad or a Chromebook) and being walked through …
Pixel Art
In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …
Pixel Art
In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …
Pixel Coding
In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …
Powerful Passwords
This activity teaches students the importance of creating a safe and secure password. In addition, students will also …
Powerful Passwords
This activity teaches students the importance of creating a safe and secure password. In addition, students will also …
Protect Your Passwords
This activity teaches students the importance of creating a safe and secure password. In addition, students will also …
Radio Communicating with Microbits
In this project, you and a partner will code a program that is capable of sending a coded message to each other. Each of …
Radio Kindness
Sharing and receiving kindness is a good way to support your well-being and that of your friends. In this activity you …
Real World Cyber Security Historical Event
Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …
Real World Cyber Security in the Present
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …
Real World Cybersecurity
Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …
Secure Your Future. Cyber Security Safety.
Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …
Security Risks & Consequences
This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how …
Shark Tank
Students will design an application to solve a problem that exists in 'their world'. They will need to create something …
Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.
Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …
The Card Catalog: Computer of Yesteryear
This lesson will show students how computer coding is used to solve the problem of quickly accessing books using the …
The HANDbook
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …
The Problem with Plastics
3rd grade learns about Jacques Cousteau and his conservation efforts to clean up the ocean. Plastic waste has become a …
They're Listening
This lesson is going to be about discussing internet safety, and how simple home items may be listening.
Think Like a Hacker
Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …
What to do with the stuff I have
Students are given CONNEX or VEX pieces from a build kit and are given a mission. As a team they will create an artifact …
Zoo Data
Students will collect data on what animals they would keep in a library. Students will choose their top 5 animals that …