Cybersecurity
70 lessons found.
"So, you want to work for the DNI"
This is an introduction to the CyberSecurity aspect of National Intelligence
Basic aspects of Cyber security and Copyrights
Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …
Can You Keep a Secret?
Elementary students will be able to identify the meaning of "password". Students will explain reasons why a strong …
Careers in Cybersecurity
“Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, …
Careers in the Cyber World
This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …
Creating a Strong Username and Password
This lesson will discuss the importance of using a unique username, and help create a strong password using a Caesar …
Critical Infrastructure 1
Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …
Critical Infrastructure 2
Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity
Cryptography
In this activity students are introduced to The Caesar Cipher and create a cipher wheel and practice using the cipher.
Cryptology
This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …
Cryptology with micro:bits
This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …
Cybersecurity - Hand Introduction and Confidentiality
Introduction to the GenCyber Hand concepts - also includes Confidentiality topics.
Cybersecurity - Hello!
The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.
Cybersecurity - Integrity
Introduction to the concept of integrity with a video, unplugged activity, and discussion
Cybersecurity - Secure Passwords
Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong …
Cybersecurity 101 (4th Grade)
The teacher will introduce the topic of cybersecurity by asking students about any personal experience they have had …
Cybersecurity Career Poster Project
Students will design a poster project detailing an individual cybersecurity career. The poster project will include …
Cybersecurity Training part II
How are devices that are not physically connected able to communicate? micro:bits will be used to help students …
Cybersecurity: Denial of Service Attack
In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …
Denial of Service Attack
Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …
Digital Citizenship
In todays lesson we will be exploring internet privacy and security.Students learn how to protect personal information …
Do’s and Don'ts on the internet
Introduction: “Today, we live in a time characterized by rapid technology transformation, and resulting social, …
Don't Feed the Phish (Adapted from Common Sense Media's Digital Citizenship Curriculum
This lesson helps students identify phishing attacks over networks via email, texts, and online pop-ups and ads, etc. A …
E is for Erosion, C is for Cybersecurity
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …
E' is for Erosion
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …
ELA9: Identifying Point of View using Cyber Security
Analysis of the Unreliable Narrator with Cyber Security
Encrypted Messages to Mars
"The NASA Deep Space Network (DSN) is an international network of antennas that provide the communication links between …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
Fundamentals of Cyber Safety
Students will listen to a short presentation about three of the six cybersecurity hand concepts. Students will then be …
Gesturing for Cybersecurity
Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …
Honesty and Integrity
Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …
How safe are they?
Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …
How safe are we? ¿Qué salvo estamos?
I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …
I = Integrity
Students will locate, read and research articles from sources to better understand using credible sources for research.
I've got a secret!
Bee Boop Bee Boop! This lesson will explore cryptology and ciphers. We will reserach the topic using a scavenger hunt …
Integrity and Keep It Simple
The purpose for this lesson is to help you understand the notions or aspects of integrity and the simplicity with which …
Internet Safe!
Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …
Internet Safe!
Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …
Intro to Cybersecurity HAND Concepts Part 2
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Introduction of Cybersecurity/ Confidentiality Availability
1. Test students' prior knowledge
Introduction to Cybersecurity Hand Concepts
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Keep Your Lips Sealed
There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …
Lesson Plan 3-Security Risks & Consequences
Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them. …
Life Sciences Through micro:bits
Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …
Malware: The Rat
With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …
Miscommunication in Communication
For the Nature of Science students are practicing going through steps in scientific inquiry. Students need to …
Morphology through Cyber Security
Students will identify and define words utilizing basic tenets of cyber security.
Nature of Science & Life Science / micro:bits
Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …
Online Mindfulness
On the internet, students interact with websites, peers, and strangers throughout the day. With that said, students must …
Radio Communicating with Microbits
In this project, you and a partner will code a program that is capable of sending a coded message to each other. Each of …
Real World Cyber Security Historical Event
Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …
Real World Cyber Security in the Present
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …
Real World Cybersecurity
Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …
Secrets Told!
Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …
Secure Your Future. Cyber Security Safety.
Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …
Security Risks & Consequences
This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how …
Sound Wave Basics with micro:bits
This lesson uses MakeCode and micro:bit to analyze sound waves. Students will learn how frequency and volume affect the …
Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.
Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …
Surprise! We get to have new Pets!
This is an opportunity for students to learn more about coding through creating a micro:pet with a partner, It will …
Talk to the Hand
This is practicing lesson plan for Thinking like an Adversary and the Availability.
TALK TO THE HAND - KEEP IT SIMPLE
The students will be able to create a handbook using the Hand Method of CyberSecurity.
TALK TO THE HAND – DEFENSE IN DEPTH
Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …
TALK TO THE HAND – INTEGRITY
The students will be able to create a handbook using the Hand Method of CyberSecurity.
TALK TO THE HAND – THINK LIKE AN ADVERSARY
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …
The HANDbook
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …
They're Listening
This lesson is going to be about discussing internet safety, and how simple home items may be listening.
Think Like a Hacker
Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …
Thinking Cyber
I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …
Using AI As A Tool
Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.