For Ages: Grade 7 Adult
digital footprint teacherspayteachers discussing situations positive students different help create Coming Soon: Unplugged version with Introducing the Security Cards handout and slide-free teachers notes.
21stcentury flipgrid teacherspayteachers Once kids are done watching the video, they can try the multiple-choice practice quiz or test. Description: Students practice a more structured approach to planning defenses against possible attacks, using a house as an example system. It includes an encryption activity using a simple cipher implemented using a spreadsheet. Topic: programming, Unplugged is a collection of free learning activities that teach Computer Science through engaging games and puzzles that use cards, string, crayons and lots of running around. << /Length 5 0 R /Filter /FlateDecode >> Topic: programming, The NICE tutorials are instructional webinars that are tailored to provide information to a wide audience about the variety of cybersecurity education and workplace development-related topics.For Ages: Grade 12 and aboveTopic: instructional webinars, The Raspberry Pi Foundation works to increase the number of people who can understand and shape the technological world by giving the power of digital making to all the people.

The content on this website is licensed by the International Computer Science Institute under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA) | Banner images by Ketrina Yim (CC BY-NC-SA) | Disclaimer. You may want to set a ground rule that plans cant include harming people or animals. For Ages:Grade 12 and above After hearing a Red Team plan to get the paper, ask if any of the Blue Teams has a plan to prevent that specific attack. Some of the resources have been created with specific exam/course specifications in mind, but feel free to incorporate them however you like! For Ages: High School Adult The lesson includes discussions, scenarios and research which will help students to evaluate the harm and, in some cases, good, that hackers can cause. This lesson is built around a series of progressively more structured threat modeling activities, demonstrating the value of taking an organized approach. Present a list of articles they can choose from. Educators incorporate Scratch into a wide range of topics and age groups. Before beginning your cybersecurity unit, we recommend you ask students to sign an agreement such as the one below. Topic: security, UDACITY has several nano degrees that let you learn a skill in the tech field. Its easier to think of attacks than it is to think of protection measures. In groups, well work through an example of how you would create a threat model for a basic house.

Use our lesson plans to deliver cyber security and networking topics at secondary and sixth form levels. This learning assessment can be used as an in-class quiz or as homework.

Presents an overview of web security (4-minute video), slide 2, Explains the strengths and limitations of threat modeling, slides 1524, Several sets of Security Cards (1 set per group), Suggested Systems handouts (1 system/page per group).

Are there any computer systems in the world that are safe from being hacked?
conquer safely Caveat: Some of the Cards include technical details about particular types of cyberattacks your students may not be familiar with yet (especially if this is their first cybersecurity lesson!). Quality AssuredCategory:ComputingPublisher:Hacker high school. This activity works best as a lead-in/contrast to the more organized activities later in this lesson plan.
safety internet infographic infographics teens cyber computer seniors safe social tips beginners lessons theft identity infographicszone technology teaching Students can enumerate some reasons cybersecurity is important. Copies of the assignment handout (one per student/group). This activity further develops the framework for structured security thinking introduced in the Explore and Explain activities.
A resource from CS Unplugged that covers the basics of public key encryption and key generation. Topic: programming, PyLadies.com is an international mentorship group which focuses on helping women become pioneers in using the Python language. Think about whether students can easily relate to the incident or its consequences. What would a totally safe system look like? Cybersecurity at A-Level focuses primarily on the techniques associated with securing a network, while also touching on the associated laws and ethical and moral values. Central Statistics Online a leading information source for chief security officers and senior executives, recently examined industry surveys and research studies to understand the current cyber security landscape. Topic: programming, EDX is an open source higher education platform that provides resources for over 5M+ learners. Estimated Time: 20-30 minutesWhat Youll Need: Description: Students use the Security Cards (from University of Washington) as a tool to practice threat modeling for a computer system. Learn a different language at your own pace. For Ages:Grade 12 and aboveTopic:cybersecurity, The Blockly library adds an editor to your app that represents coding concepts as interlocking blocks. How do computers get involved in these attacks without the consent of the owner? Projects are the basis of your learning. Identify stakeholders (direct and indirect) and what data the system handles. In the physical world, these exercises are used by the military to test force-readiness. Starting a conversation in the classroom is a great step towards making students world more secure. 63% of companies said their data was potentially compromised within the last year. Network security lesson plan and activities, Compression, encryption and hashing topic exploration pack, The Peruvian Coin Flip - Cryptographic Protocols, University of York, Heslington, York Y010 5DD.
60% of data breaches involve vulnerabilities that could have been avoided. Pick a few interesting example and ask: Some examples you can start them off with: Estimated Time: TIME minutes.What Youll Need: Computer and projector. Beginning with one of the Red Teams, ask the groups to report back. Industry, government, academia, this is your one stop place for WiCyS! Ground students learning in firsthand experience and spark new ideas. Essential Knowledge points covered: LO IOC-2.C Explain how unauthorized access to computing resources is gained. Print one secret for each Blue Team, for them to keep hidden from the Red Team. It is an excellent start to your K-6 cyber security curriculum. Topic: security, This blog post contains information about the all-timefavorite Cryptography!For Ages:Grade 12 and aboveTopic:cryptography, This blog post contains various sites that help with coding and web development.For Ages: Grade 5 and aboveTopic: computer coding, 2022 CybHer: Women & Girls in Cyber Security :: Website Design & Development by HenkinSchultz, CS.ColumbusState.edu CyberSecurity Roadshow. LO CSN-1.A Explain how computing devices work together in a network. This page contains a list of links for parents, teachers, and students to learn coding, cybersecurity concepts, and more! For Ages: High School Adult Topic: programming, With Scratch, you can program your own interactive stories, games, and animations and share your creations with others in the online community.

Why do you need to protect systems from attackers?

Estimated Time: 15 minutes.What Youll Need: Computer, projector, and speakers.
lesson plans ks3 bullying resources secondary safety cyberbullying consequences cyber safeguarding essentials Its impossible to think of and protect against every way someone could possibly abuse those channels, other than just disabling them entirely. 8y Introduce the activity, using the slides and lecture notes. Host of the annual cyber picoCTF ("capture the flag") competition, Carnegie Mellon University offers dozens of free cyber security games that challenge and engage college and high school students. There are no practical activities attached to this lesson from Cybersecurity Challenge UK.

For Ages: Grade 7 Adult

Ask groups to report back on their card choices and priorities. Check your district's policies to see whether students will need to have their parents sign the agreement as well.
digital citizenship lesson teaching footprint cyber worksheets bullying worksheet vocabulary english reading esl eslprintables Topic: programming, Unplugged, or no computer needed, activities.For Ages: Kindergarten Grade 12Topic: computer science activities, This site has curriculum for teaching cybersecurity to the k-16 audience. As with all code.org lessons, a comprehensive teacher's guide, activity, vocabulary, warm-up and summary are included. The handout has four pages, one for each system. What Youll Need: Computer and projector (optional). Allow both teams imaginations to run wild. The actual security of security issues, SQL injection attacks, the actual status of "deleted" files (hint: they are not removed), and other fascinating cybersecurity issues. Give students 10-15 minutes to complete the Blue Team part of the worksheet (i.e.
safety cyber internet middle social rules smarts digital activities bullying counselor science themiddleschoolcounselor bingo classroom netiquette cyberbullying create counseling cybersafety ~ computers with no connection to the Internet -- yes, they can be hacked!). MAYBE CHECK WITH BRYAN FOR INSTRUCTIONS ON HOW TO ADD MEDIA; ITS WEIRD. Estimated Time: TIME minutes.What Youll Need: Computer, speakers, and projector. In comparison to other major industries, research claims that the education sectorranked lastin terms of good cyber security performance, making it very important than ever aware students about cyber security and allow them to take responsibility for their internet safety, especially at presents as learners are locked up in the home after the COVID-19 outbreak and had to make a sudden transition to online education, it has become essential to teach them about cyber security for their safe and secure internet use. Why or why not?

For Ages: High School Adult For Ages: Kindergarten Grade 12
Give students 5-10 minutes to plan how they could gain access to the valuables inside the houses. The house on the worksheet and your answers to the first couple of questions are the model of what youre protecting. Custom blocks may be created to connect to your own application. If youre short on time, you can direct Red Teams to write their responses on page 3, but skip having them represent their attacks on the Blue Teams diagrams. Without threat models, you can never stop playing whack-a-mole. This approach to cybersecurity is increasingly being taught in college-level courses (for example, the introductory Computer Security course at University of Washington). This site uses cookies to improve your experience, read our policy.

This is an animated video introducing five basic Internet safety and security rules, explained sincerely by Hippo and Hedgehog. autoresize=true height=400 header=show ssl=true], AP Computer Science Principles Framework for 202021, Fall 2019 version, https://securitycards.cs.washington.edu/activities.html, Creative Commons Attribution-NonCommercial-NoDerivs 3.0, The Biggest Cybersecurity Crises of 2019 So Far, Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License. Introduce important facts and underlying concepts. Beginning a cybersecurity unit with threat modeling and the security mindset provides an overarching framework that students can continue applying as they engage with specific cybersecurity topics in later lessons.

Geared towards AP Computer Science Principles, but compatible with any introductory computer science course. Ask your students to form groups of three or four. Scratch can be used to code their own interactive stories, animations, and games, and while doing the same, they learn to think creatively, reason systematically, and work collaboratively. This document is produced by the awarding body OCR and provides links and suggested activities for the topics of compression, encryption and hashing. Topic: programming, networking and security, Khan Academy offers practice exercises, instructional videos, and a personalized learning dashboard that empower learners to study at their own pace in and outside of the classroom. Every minute, $17,700 is lost due to phishing attacks. Tips On Building A Positive Classroom Culture, Upswing Partners with TimelyMD to Deliver Mental Health Services to Non-traditional College Students. This lesson plan focuses on what hackers do and how attacks happen. Designed especially for ages 8 to 16 but is ideal for people of all ages. Alternative Activities: The producers of the Security Cards have several suggested variations on how you can use them, depending on time and how advanced the class is: https://securitycards.cs.washington.edu/activities.html. %PDF-1.3 Description: In this presentation, students learn about what cybersecurity is, how threat modeling works, and why threat modeling is a useful place to start for cybersecurity. Coming Soon: Graphic organizer for student note-taking. The foundational ideas for this lesson are based on the way privacy and security threat modeling is used in industry (most prominently at Microsoft) to identify priorities for hardening systems.
awesomescience Estimated Time: TIME minutes.What Youll Need: Blackboard/whiteboard (optional). Description: Teachers can use current news items about cyberattacks/data breaches or cybersecurity innovations to grab students attention at the beginning of class and illustrate the relevance of cybersecurity.

Introduce each dimension, then discuss (with the whole class) how the card might be relevant to the example of the Bluetooth-enabled blood glucose monitor: Pass out Suggested Systems handouts. Introduce the concept of a Red Team/Blue Team exercise: Red Team/Blue Team exercises take their name from a military exercise. Social engineering attacks are a vulnerability of corporate networks and personal data and identity. This lesson addresses standards laid out in the AP Computer Science Principles Framework for 202021, Fall 2019 version. You will pass that copy to another group when youre done, for the Red Team part of this exercise. Who would do such a thing and why? Topic: security, GA Dash will teach you how to make fun and dynamic websites. Each lesson contains general information, materials, step-by-step instructions and customization tips. Free account required. Pass out a deck of Security Cards to each group. Kids code jeunesse (kcj) is a Canadian bilingual, non-profit organization that aims to give every Canadian child access to digital skills education, focusing on girls and underserved communities.
CyberStart Go features a superb selection of free cyber games sorted by difficulty level and subject. For Ages: High School Adult The slide deck shows one sample card from each dimension.
bullying worksheet cyber parents should know lesson handouts worksheets planet resource Penetration testing is a vital part of any organisations security procedures. The agreement commits them to use their powers only for good, and lays out some specifics of what that means. What Youll Need: Blackboard/whiteboard (optional). What is cybersecurity? It includes learning about digital citizenship, cyber hygiene, cryptography, software security, basic networking principles, and systems administration. Label each group as a Red Team or a Blue Team. Have students choose which system their group will model, or otherwise explain what system theyll be using (see Options below).
pledge netsmartz workshop For Ages: Kindergarten Grade 12

stream Topic: app development, A digital library that hosts a diverse collection of cybersecurity Learning ObjectsFor Ages: Grade 11 AdultTopic: cyber security curri, SecurityTube has videos, a newsletter and forums to learn the latest in security. We suggest Think-Pair-Share, Inside/Outside Circles, Chalk Talk, or Listening Dyads, but many others can be found on the NSRFs protocol list. This document outlines categories of network threat and how they can be detected.
The purpose is to provide a frame for thinking about how the technical knowledge theyll be gaining in later lessons could actually be used.
citizenship nepcall Examples can be written on the board. Pass out pages 1 and 2 of the worksheet to each group. Students will learn what it is and why organisations carry it out. Check out this resource from Google. Topic: security literacy, Blackgirlscode aims to increase the number of women of color in the digital space by empowering them to become innovators in STEM fields, leaders in their communities, and builders of their own futures through exposure to computer science and technology. For Ages: Grade 2 Grade 12 Topic: programming, With the help of Student Digital Cyber Academy, go from being a cyber novice to cyber hero, no previous coding or IT experience needed and at the end of it youll have developed the skills to get your first job in cybersecurity.