Please enable JavaScript to use CodeHS

Indiana Principles of Computing

Description

Students will be introduced to cybersecurity and learn how cyberattacks can negatively affect businesses.

Objective

Students will learn why cybersecurity is an important consideration when developing any computer program.
Students will learn how cyberattacks can negatively affect a business.

Description

As students use the Internet, they are building their digital footprint. In this lesson, students understand how they can control and protect their footprint.

Objective

SWBAT understand how their online activity contributes to a permanent and public digital footprint.
SWBAT articulate their own social media guidelines to protect their digital footprint.

Description

Using best practices like setting strong passwords, reading privacy policies, and using https can help us stay safe online.

Objective

SWBAT use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies.

Description

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

SWBAT effectively search for and evaluate resources.

Description

In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

Objective

SWBAT explain what copyright laws are and why they are important
SWBAT find images they are legally allowed to use in their projects
SWBAT accurately attribute images they find and want to use

Description

A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.

Objective

SWBAT identify the difference between white hat hacking and black hat hacking
SWBAT sign an ethical hackers agreement, agreeing that they will only practice hacking under legal and ethical circumstances

Description

In this lesson, students are introduced to the concept of risk assessment, and students learn about the role of vulnerability scans in detecting weaknesses. Students also learn about honeypots and packet sniffing and explore how these tools can be used to detect vulnerabilities and improve the security of a network.

Objective

Students will be able to:

  • Explain how vulnerability scans can improve network security
  • Define risk assessment and explain its role in network security
  • Explain how tools such as honeypots and packet sniffing can improve the security of a network
Description

Digital Citizenship and Cyber Hygiene unit quiz

Objective

SWBAT complete the Digital Citizenship and Cyber Hygiene unit quiz