GenCyber

50 lessons found.

"So, you want to work for the DNI"

This is an introduction to the CyberSecurity aspect of National Intelligence

Jerry Updike 9-12 Computer ScienceSocial StudiesTechnology
CybersecurityData CollectionGenCyberRoboticsmicro:bit

Basic aspects of Cyber security and Copyrights

Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …

Judes Francois 3-56-8 CybersecurityReading/Language Arts
CybersecurityGenCyber

Can You Keep a Secret?

Elementary students will be able to identify the meaning of "password". Students will explain reasons why a strong …

Phaedra Davila K-23-5 Computer ScienceMathematicsReading/Language Arts +1
CybersecurityGenCyber

Careers in Cybersecurity

“Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, …

Janixa Burgos 6-8 CybersecuritySocial-Emotional Learning
CybersecurityGenCyber

Careers in the Cyber World

This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …

Tina Simpson 9-12 Career and Technical EducationComputer Science
CybersecurityGenCyber

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 CybersecurityScience
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceEngineeringScience +2
CybersecurityGenCybermicro:bit

Cryptology

This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCyberWeb Design

Cryptology with micro:bits

This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCybermicro:bit

Cybersecurity - Hand Introduction and Confidentiality

Introduction to the GenCyber Hand concepts - also includes Confidentiality topics.

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCybermicro:bit

Cybersecurity - Hello!

The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.

Tina Simpson 6-89-12 Computer Science
CybersecurityGenCyber

Cybersecurity - Integrity

Introduction to the concept of integrity with a video, unplugged activity, and discussion

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCyberUnplugged

Cybersecurity Career Poster Project

Students will design a poster project detailing an individual cybersecurity career. The poster project will include …

Jana Simmerly 6-8 Computer ScienceEngineeringScience
CybersecurityData CollectionGenCyber

Cybersecurity Training part II

How are devices that are not physically connected able to communicate? micro:bits will be used to help students …

Genel Jasmin 6-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCybermicro:bit

Cybersecurity: Denial of Service Attack

In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …

Jumoke Adebimpe 9-12 Computer Science
CybersecurityGenCyber

Denial of Service Attack

Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …

Jumoke Adebimpe 9-12 CybersecurityScienceTechnology
CybersecurityGenCyber

Do’s and Don'ts on the internet

Introduction: “Today, we live in a time characterized by rapid technology transformation, and resulting social, …

Janixa Brugos 6-8 CybersecuritySocial-Emotional Learning
CybersecurityGenCyber

ELA9: Identifying Point of View using Cyber Security

Analysis of the Unreliable Narrator with Cyber Security

Andrew Disney 9-12 Computer ScienceReading/Language Arts
CybersecurityGenCyber

Encrypted Messages to Mars

"The NASA Deep Space Network (DSN) is an international network of antennas that provide the communication links between …

Jesica Jones-Saka 6-8 Computer ScienceScienceTechnology
CybersecurityGenCyberUnpluggedmicro:bit

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 CybersecurityScience
CybersecurityGenCyber

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 CybersecurityScience
CybersecurityGenCyber

Fundamentals of Cyber Safety

Students will listen to a short presentation about three of the six cybersecurity hand concepts. Students will then be …

Genel Jasmin 6-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCybermicro:bit

Gesturing for Cybersecurity

Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …

Billie Rainey 6-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCyberScratch

Honesty and Integrity

Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …

Stephen Callum 9-12 CybersecuritySocial Studies
CybersecurityGenCyber

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

How safe are we? ¿Qué salvo estamos?

I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCybermicro:bit

I = Integrity

Students will locate, read and research articles from sources to better understand using credible sources for research.

Billie Rainey 6-8 Computer ScienceReading/Language ArtsSocial Studies +1
CybersecurityGenCyber

Integrity and Keep It Simple

The purpose for this lesson is to help you understand the notions or aspects of integrity and the simplicity with which …

Judes Francois 3-56-8 CybersecurityScienceSocial Studies +1
CybersecurityGenCyber

Intro to Cybersecurity HAND Concepts Part 2

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceScienceTechnology
CybersecurityGenCybermicro:bit

Introduction of Cybersecurity/ Confidentiality Availability

1. Test students' prior knowledge

Judes Francois 3-56-8 Computer ScienceReading/Language ArtsTechnology
CybersecurityGenCyber

Introduction to Cybersecurity Hand Concepts

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceMathematicsReading/Language Arts +2
CybersecurityGenCyber

Keep Your Lips Sealed

There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …

Holley Nichols 9-12 Computer ScienceEngineeringTechnology
CybersecurityData CollectionGenCyber

Life Sciences Through micro:bits

Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …

Sebastian Herrera 9-12 CybersecurityScience
CybersecurityData CollectionGenCybermicro:bit

Miscommunication in Communication

For the Nature of Science students are practicing going through steps in scientific inquiry. Students need to …

Jesica Jones-Saka 6-8 Computer ScienceScience
CybersecurityGenCybermicro:bit

Morphology through Cyber Security

Students will identify and define words utilizing basic tenets of cyber security.

Andrew Disney 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Nature of Science & Life Science / micro:bits

Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …

Sebastian Herrera 9-12 CybersecurityScience
CybersecurityData CollectionGenCybermicro:bit

Secrets Told!

Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …

Holley Nichols 9-12 Computer ScienceEngineeringTechnology
CybersecurityGenCyber

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Sound Wave Basics with micro:bits

This lesson uses MakeCode and micro:bit to analyze sound waves. Students will learn how frequency and volume affect the …

Jana Simmerly 6-8 CybersecurityScience
CybersecurityGenCybermicro:bit

Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.

Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCyber

Surprise! We get to have new Pets!

This is an opportunity for students to learn more about coding through creating a micro:pet with a partner, It will …

Phaedra Davila K-23-5 ArtComputer ScienceScience +1
CybersecurityGenCybermicro:bit

Talk to the Hand

This is practicing lesson plan for Thinking like an Adversary and the Availability.

Everett Fleming 9-12 CybersecurityMathematics
CybersecurityData CollectionGenCyber

TALK TO THE HAND - KEEP IT SIMPLE

The students will be able to create a handbook using the Hand Method of CyberSecurity.

Shamrie Jones 6-8 CybersecurityTechnology
CybersecurityGenCybermicro:bit

TALK TO THE HAND – DEFENSE IN DEPTH

Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …

Lorraine Grice 9-12 CybersecurityTechnology
CybersecurityGenCybermicro:bit

TALK TO THE HAND – INTEGRITY

The students will be able to create a handbook using the Hand Method of CyberSecurity.

Shamrie Jones 6-8 CybersecurityTechnology
CybersecurityGenCybermicro:bit

TALK TO THE HAND – THINK LIKE AN ADVERSARY

In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …

Lorraine Grice 9-12 CybersecurityTechnology
CybersecurityGenCybermicro:bit

The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …

Everett Fleming 9-12 CybersecurityMathematics
CybersecurityGenCyber

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Thinking Cyber

I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …

Jerry Updike 9-12 Computer ScienceReading/Language ArtsSocial Studies
CybersecurityData CollectionGenCybermicro:bit

Using AI As A Tool

Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.

Stephen Callum 9-12 CybersecuritySocial Studies
CybersecurityGenCyber