Networks and the Internet

89 lessons found.

"So, you want to work for the DNI"

This is an introduction to the CyberSecurity aspect of National Intelligence

Jerry Updike 9-12 Computer ScienceSocial StudiesTechnology
CybersecurityData CollectionGenCyberRoboticsmicro:bit

All about the Internet

How Does the Internet Work? Learning about networks, protocols, TCP/IP

Christy Rodgers 6-8 Computer ScienceTechnology

Basic aspects of Cyber security and Copyrights

Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …

Judes Francois 3-56-8 CybersecurityReading/Language Arts
CybersecurityGenCyber

Being Aware of What You Share

Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand …

Autumn Spiva 6-8 Computer ScienceReading/Language Arts

Bookmarking Websites

Searching for websites can be time-consuming. Imagine having to re-discover the places where we buy our groceries or …

Justin Hansen 3-5 Computer Science

Can you escape the maze?

Students will use two different maze websites throughout the lesson. They will use speaking and listening skills to exit …

Amber E Johnson 3-5 Computer ScienceReading/Language ArtsTechnology

Candy Burglar: Password Lesson

Candy Burglar: Password Lesson Students will each receive a card with a symbol or word on it. The symbol will match with …

Michelle Black K-2 Computer Science
Unplugged

Careers in the Cyber World

This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …

Tina Simpson 9-12 Career and Technical EducationComputer Science
CybersecurityGenCyber

CODIS & Forensic Science

Students will work together as forensic scientists to solve the crime of “Who broke into our school and stole all the …

Alicia Vonberg 6-8 Computer ScienceScience
Data Collection

CODIS & Forensic Science

Students will work together (in teams of 4) as forensic scientists to solve the crime of “Who broke into our school and …

Alicia Vonberg 6-8 Computer ScienceEngineeringScience
Data CollectionUnplugged

Collaborative Grid Poster

The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …

Mackenzie Wiginton 9-12 ArtComputer Science
Data Collection

Computer Basics (Collaborative lesson with K and 5)

5th grade students will mentor kindergarten students in how to properly care for and navigate their personal computer. …

Melissa Harris K-23-5 Computer ScienceReading/Language ArtsTechnology

Computer Basics (Collaborative lesson with K and 5th)

Kindergarten students will be working with 5th grade students to learn about the proper care and use of their computers. …

Sadie Graff K-23-5 Computer ScienceReading/Language ArtsTechnology

Create Your Own Musical Code

Different applications and disciplines often require knowledge of different communication systems and the ability to …

Colin Botts 3-5 Computer ScienceMusic
Data Collection

Creating a Strong Username and Password

This lesson will discuss the importance of using a unique username, and help create a strong password using a Caesar …

Kayla Horn 3-5 Computer ScienceTechnology
Cybersecurity

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 CybersecurityScience
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceEngineeringScience +2
CybersecurityGenCybermicro:bit

Cybersecurity - Hand Introduction and Confidentiality

Introduction to the GenCyber Hand concepts - also includes Confidentiality topics.

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCybermicro:bit

Cybersecurity - Integrity

Introduction to the concept of integrity with a video, unplugged activity, and discussion

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCyberUnplugged

Cybersecurity - Secure Passwords

Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong …

Justin Hansen 3-5 Computer ScienceLibrary MediaTechnology
Code.orgCybersecurity

Cybersecurity 101 (4th Grade)

The teacher will introduce the topic of cybersecurity by asking students about any personal experience they have had …

Stacy Lynn Martinez 3-5 Computer ScienceTechnology
CybersecurityUnplugged

Cybersecurity Career Poster Project

Students will design a poster project detailing an individual cybersecurity career. The poster project will include …

Jana Simmerly 6-8 Computer ScienceEngineeringScience
CybersecurityData CollectionGenCyber

Cybersecurity: Denial of Service Attack

In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …

Jumoke Adebimpe 9-12 Computer Science
CybersecurityGenCyber

Darn! I forgot my password...again!

Middle School Students love to share everything-including their water bottles, their sense of humor and even their …

Tracey Winey 6-8 Computer ScienceReading/Language ArtsTechnology
Code.org

Darn! I forgot my password...again!

Middle School Students love to share everything-including their water bottles, their sense of humor and even their …

Tracey Winey 6-8 Computer ScienceTechnology
Code.org

Darn! I forgot my password...again!

Middle School Students love to share everything-including their water bottles, their sense of humor and even their …

Tracey Winey 6-8 Computer ScienceReading/Language ArtsTechnology
Code.org

Denial of Service Attack

Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …

Jumoke Adebimpe 9-12 CybersecurityScienceTechnology
CybersecurityGenCyber

Digital Citizenship

In todays lesson we will be exploring internet privacy and security.Students learn how to protect personal information …

Kailey Simms 3-5 Computer Science
Code.orgCybersecurityWeb Design

Digital Citizenship Escape Room

Beginning of the year introduction to digital citizenship. Students work through escape room to perform tasks. The tasks …

Melissa Harris 3-5 ArtComputer ScienceReading/Language Arts +1
Game-Based

Discover Digital Citizenship

Students will use a decoder to decode messages that lead to exploration of Digital Citizenship resources. They will then …

Melissa Harris 3-56-8 ArtComputer ScienceMathematics +2

Do’s and Don'ts on the internet

Introduction: “Today, we live in a time characterized by rapid technology transformation, and resulting social, …

Janixa Brugos 6-8 CybersecuritySocial-Emotional Learning
CybersecurityGenCyber

Don't Feed the Phish (Adapted from Common Sense Media's Digital Citizenship Curriculum

This lesson helps students identify phishing attacks over networks via email, texts, and online pop-ups and ads, etc. A …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Cybersecurity

E is for Erosion, C is for Cybersecurity

Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …

Katie Cline 3-5 Computer ScienceScienceTechnology
CybersecurityProject-Based

Ethics in Technology

Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google

Jamie Le Jambre 6-89-12 Computer ScienceSocial StudiesTechnology
Data Collection

Evolution of the Telephone

Students spend several periods looking at the development of communication over the past 200 years.

Victoria Davis K-23-5 Computer ScienceScienceSocial Studies +1
micro:bit

Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits

Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …

Noel Davis 6-89-12 Computer ScienceScienceTechnology
Code.orgData Collectionmicro:bit

Future Job Research

Student is required to 'explore future occupations' as defined by Occupational Outlook Handbook at …

Harry C Guess 6-8 Computer ScienceTechnology
Project-BasedWeb Design

Gesturing for Cybersecurity

Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …

Billie Rainey 6-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCyberScratch

Get to Know Me

Students will participate in a community building activity that will integrate Computer Science through the use of the …

Kiley Hiser K-2 Computer ScienceTechnology

Get to Know Me

Students will participate in a community building activity that will integrate Computer Science through the use of the …

Melanie Mullikin K-23-5 Computer ScienceReading/Language ArtsTechnology

Getting started with Micro:bit

Students will explore the functions of the MIcro: bit. Students have not had experience with this and I have very …

Melissa Harris K-23-5 Computer ScienceMathematicsReading/Language Arts +1
micro:bit

Hardware/Software Sorting Activity

Hardware/Software Sorting Activity: For this exploration, you and your partner will sort the computer science resource …

Terry Highfield K-23-5 Computer Science

Honesty and Integrity

Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …

Stephen Callum 9-12 CybersecuritySocial Studies
CybersecurityGenCyber

Hour of Code introduction/ Ecosystems

this will be an introduction to coding using Hour of Code, as a refresher/ attention grabber right after Christmas …

Brenna Franklin 6-8 Science
Code.orgData Collection

How do we know if a source is reliable?

The students will analyze three different websites. During their exploration the students will answer three questions. …

Chad Miller 6-8 Computer ScienceSocial StudiesTechnology

How Information is Transferred Over the Internet and Internet/Database Research Search Strategies

This lesson introduces the process by which information is sent between computers and networks as packets of binary code …

Ron Chesmore 6-8 Computer ScienceLibrary Media

How Information is Transferred Over the Internet and Internet/Database Search Strategies

Students will be introduced to the concept of data/information transfer across computer devices and the Internet, …

Ron Chesmore 6-8 Computer ScienceLibrary MediaTechnology
Unplugged

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

How safe are we? ¿Qué salvo estamos?

I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCybermicro:bit

I = Integrity

Students will locate, read and research articles from sources to better understand using credible sources for research.

Billie Rainey 6-8 Computer ScienceReading/Language ArtsSocial Studies +1
CybersecurityGenCyber

Integrity and Keep It Simple

The purpose for this lesson is to help you understand the notions or aspects of integrity and the simplicity with which …

Judes Francois 3-56-8 CybersecurityScienceSocial Studies +1
CybersecurityGenCyber

Internet Information Research and Retrieval Processes and Effective Search Strategies

This lesson will introduce the concepts of information research strategies, information storage, and retrieval systems …

Ron Chesmore 6-8 Computer ScienceLibrary MediaTechnology
Data CollectionUnplugged

Internet Safe!

Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …

Megan Moore 3-5 Computer ScienceTechnology
Cybersecurity

Internet Safe!

Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …

Megan Moore 3-5 Computer ScienceTechnology
Cybersecurity

Introducing our Technology

This lesson is designed to be delivered early in the year to establish a common knowledge base on the programs to be …

Chase Christensen K-2 Computer ScienceMathematicsReading/Language Arts

Introduction of Cybersecurity/ Confidentiality Availability

1. Test students' prior knowledge

Judes Francois 3-56-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCyber

Introduction to Computer Science and SpeedGeeking 101

Part 1: Gauge student understanding of computer science and introduce basic CS vocabulary. Part 2: Teach students about …

Whitney Wilking 6-8 Computer ScienceReading/Language ArtsTechnology
Data CollectionRobotics

Introduction to Micro:bits

Students will learn what micro:bits are and how they can be used. They will also learn how to code their own micro:bits. …

Jenny Day K-2 Computer ScienceTechnology
RoboticsScratchUnpluggedmicro:bit

Learning the Importance of Authentication Factors

Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use …

Kathleen Cherry K-2 Computer Science

Lesson Plan 2-First LEGO ® League “White Energy Journey”

Students will work independently to design a ‘driving base’ using the SPIKE PRIME LEGO sets. Upon completion of the base …

Alicia Vonberg 6-8 Computer ScienceEngineeringMathematics +2
Project-BasedRobotics

Lesson Plan 3-Security Risks & Consequences

Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them. …

Alicia Vonberg 6-8 Computer ScienceTechnology
CybersecurityRobotics

Malware: The Rat

With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …

Jonathan Broersma 3-5 Computer ScienceReading/Language Arts
Cybersecurity

Micro:bits / Makerspace

The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …

Devin Hodgins 6-8 Computer ScienceReading/Language ArtsTechnology
Project-BasedRoboticsmicro:bit

Micro:bits / Makerspace

The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …

Devin Hodgins 3-56-8 Computer ScienceReading/Language ArtsTechnology
Data CollectionProject-Basedmicro:bit

O' is for Outlaw

Students will by studying outlaws and law enforcement in Wyoming History. We will talk about how technology has changed …

Katie Cline 3-5 Computer ScienceReading/Language ArtsSocial Studies +1

O' is for Outlaw

Students will be studying Outlaws and Law Enforcement in Wyoming History. We will talk about how technology has changed …

Katie Cline 3-5 Computer ScienceReading/Language ArtsSocial Studies +1

PE Online Resources

Students will be using their school-provided technology (whether it be an IPad or a Chromebook) and being walked through …

Cameron Spade K-2 Computer SciencePhysical Education

Pixel Art

In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …

Mackenzie Wiginton 3-5 ArtComputer Science
Data CollectionUnplugged

Pixel Art

In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …

Mackenzie Wiginton 3-5 ArtComputer Science
Data CollectionUnplugged

Pixel Coding

In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …

Mackenzie Wiginton 3-5 ArtComputer Science
Data CollectionUnplugged

Powerful Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Marisol Armstrong K-23-5 Computer ScienceTechnology
Code.orgWeb Design

Powerful Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Marisol Armstrong 3-5 Computer ScienceReading/Language ArtsTechnology
Code.org

Protect Your Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Kryssi Soule 3-5 Computer ScienceReading/Language ArtsSocial Studies +1
Code.orgWeb Design

Radio Communicating with Microbits

In this project, you and a partner will code a program that is capable of sending a coded message to each other. Each of …

Taylor Plantt 6-8 Computer ScienceEngineeringSocial Studies +1
Cybersecuritymicro:bit

Radio Kindness

Sharing and receiving kindness is a good way to support your well-being and that of your friends. In this activity you …

Anita Tope K-23-5 Computer ScienceScienceSocial Studies +2
micro:bit

Real World Cyber Security Historical Event

Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies +1
Cybersecurity

Real World Cyber Security in the Present

Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies +1
Cybersecurity

Real World Cybersecurity

Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies +1
Cybersecurity

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Security Risks & Consequences

This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how …

Alicia Vonberg 6-8 Computer ScienceEngineeringScience +1
Cybersecurity

Shark Tank

Students will design an application to solve a problem that exists in 'their world'. They will need to create something …

Shirley Johns 6-8 ArtComputer ScienceEngineering +2
Data Collection

Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.

Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCyber

The Card Catalog: Computer of Yesteryear

This lesson will show students how computer coding is used to solve the problem of quickly accessing books using the …

Michelle Ottoes 3-56-8 Computer ScienceLibrary MediaReading/Language Arts

The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …

Everett Fleming 9-12 CybersecurityMathematics
CybersecurityGenCyber

The Problem with Plastics

3rd grade learns about Jacques Cousteau and his conservation efforts to clean up the ocean. Plastic waste has become a …

Kathy Manker 3-5 Computer ScienceMathematicsReading/Language Arts +2
Data Collection

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Think Like a Hacker

Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …

Adrienne Unertl 3-56-89-12 Computer ScienceTechnology
Cybersecurity

What to do with the stuff I have

Students are given CONNEX or VEX pieces from a build kit and are given a mission. As a team they will create an artifact …

Will Barnes 6-8 ArtComputer Science

Zoo Data

Students will collect data on what animals they would keep in a library. Students will choose their top 5 animals that …

Taylor Wailes-Putnam K-23-5 Computer ScienceMathematics
Data Collection