9-12
58 lessons found.
"So, you want to work for the DNI"
This is an introduction to the CyberSecurity aspect of National Intelligence
Bake Sale Lesson 2
Students will analyze their data from the survey they conducted, find ways to represent the data, make suggestions about …
Bake Sale Lesson1
This is the first day of a two-part lesson in entrepreneurship marketing research. In the overall project, Bake Sale, …
Careers in the Cyber World
This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …
Collaborative Grid Poster
The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …
Critical Infrastructure 1
Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …
Critical Infrastructure 2
Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity
Cryptology
This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …
Cryptology with micro:bits
This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …
Cybersecurity - Hello!
The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.
Cybersecurity: Denial of Service Attack
In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …
Denial of Service Attack
Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …
Egg Drop Experiment using Microbit
Students will investigate and design an experiment that explores Newton’s 2nd Law, momentum and impulse using a …
ELA9: Identifying Point of View using Cyber Security
Analysis of the Unreliable Narrator with Cyber Security
Ethics in Technology
Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google
Exploring Outputs with an RGB Light Strip
In this lesson you will be introducing the connection of color with computer science through the use of a micro:bit and …
Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits
Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
For Loops
Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …
For Loops
Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …
Half Life Radioactive Decay with Micro:bits
Introduce basic programming of the micro:bit while reiterating the integration of math in physical science exploring …
Honesty and Integrity
Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …
How safe are they?
Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …
How safe are we? ¿Qué salvo estamos?
I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …
Implementing a Counter into Java
Activity Overview: This activity is for more advanced students in the Java Programming language. They will use their own …
Intro to Cybersecurity HAND Concepts Part 2
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Introduction to Cybersecurity Hand Concepts
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Keep Your Lips Sealed
There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …
Lesson 8: How does a cup’s surface affect how light warms up a liquid inside the cup?
This is modified from OpenSciEd under the Creative Common 4.0 License. We carry out an investigation to test the …
Life Sciences Through micro:bits
Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …
Micro bit Block Programming - 'Customizing Displays'
This lesson focuses on the LED array and how to customize graphics plus LED intensity. Students will program in Block …
Micro Bit Block Programming: 'Hello World'
This lesson introduces the basic components of the microbit, a beginners program, and teaches how to download a program …
Micro:bits: Sequencing
The students will use Micro:bit blocks to create the image of snow when shaken. This will be done with sequences, …
Morphology through Cyber Security
Students will identify and define words utilizing basic tenets of cyber security.
Nature of Science & Life Science / micro:bits
Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …
Nested Loops
This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …
Nested Loops - Inner and Outer
This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …
Nursery Rhymes and Microbits
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 2
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 3
This will be the end of this mini unit, students will present to their classmates the nursery rhyme that they have coded …
Representing Information
This lesson introduces the concept of sending bits of information from one place to another.
Secrets Told!
Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …
Secure Your Future. Cyber Security Safety.
Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …
Student Choice Mission
In this final project for the course, students team to Independently, scope the features of a piece of software,or …
Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.
Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …
Talk to the Hand
This is practicing lesson plan for Thinking like an Adversary and the Availability.
TALK TO THE HAND – DEFENSE IN DEPTH
Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …
TALK TO THE HAND – THINK LIKE AN ADVERSARY
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …
The HANDbook
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …
There Was An Old Lady....in Sequence and Loops
This lesson uses the familiar nursery rhyme and song 'There Was An Old Lady Who Swallowed a Fly' to introduce primary …
They're Listening
This lesson is going to be about discussing internet safety, and how simple home items may be listening.
Think Like a Hacker
Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …
Thinking Cyber
I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …
Understanding Pseudocode
In this lesson, students explore the methods of writing pseudocode to complex problems. Writing pseudocode is a great …
Using AI As A Tool
Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.
Using Microbits to help Students to Visualize the Stages of Mitosis
Using Microbits to help students visualize the stages of Mitosis lesson can be used after the concept of Mitosis has …
Using Microbits to measure conductivity of metallic, ionic and covalent bonds.
• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …