In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.
Students will be able to:
In this lesson, students explore the complex world of data collection. Students learn about the types of data that companies collect and what they do with it. Students also consider the ethics of data collection by working through a scenario about location tracking in school. Lastly, students learn about privacy within the context of law.
Students will be able to:
In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
Students will be able to:
By the end of this lesson, students should have a better understanding of cyberethics, responsible internet use, and the impact of copyright and licenses on the digital world. They should also be more aware of the potential consequences of unethical online behavior.
Students will be able to:
In this lesson, students learn about the importance of personal data security and explore different forms of authentication and browser security settings. Students then consider the tradeoffs between ease of use and security when implementing different authentication methods.
Students will be able to:
In this lesson, students are introduced to the core concepts of cybersecurity, focusing on the importance of protecting information and devices in the digital world. Students will explore key vocabulary terms, security frameworks, and the potential risks associated with the Internet of Things (IoT).
Students will be able to:
In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this lesson, students will learn about different encryption techniques and their historical significance. They will discover the limitations of certain methods and the evolution of cryptography throughout history. Lastly, students will also explore the future of cryptography and its potential applications.
Students will be able to:
In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process.
Students will be able to:
In this lesson, students will explore the concepts of key exchange and encryption, unlocking the secrets of how messages are protected online.
Students will be able to:
In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security. They will also discover the concept of hashing and its application in data integrity.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this project, students will apply their knowledge of ciphers and cryptography by designing and creating their own escape room experiences.
Students will be able to:
In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and updating operating systems.
Students will be able to:
This hands-on lab empowers students to personalize their computer experience by exploring display, sound, and storage settings, while also teaching them valuable troubleshooting skills. Students will learn to navigate their operating system and discover resources for further customization.
Students will be able to:
In this lesson, students delve deeper into the differences between the three main operating systems. They learn how operating systems store and manage files and the differences and similarities in each system’s interface.
Students will be able to:
In this lesson, students continue to compare and contrast different operating systems. Students learn how operating systems use file extensions to determine how to view different data types and how some extensions are only compatible with specific operating systems. Additionally, students learn about processors and the difference between a 32-bit processor and a 64-bit processor.
Students will be able to:
In this lesson, students will learn how to differentiate between laptops and tablets. Through brainstorming, activities, and discussions, students will explore the functionalities, strengths, and weaknesses of each device to make informed decisions about their own technology needs.
Students will be able to:
In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.
Students will be able to:
In this lesson, students learn about the different types of software licenses as well as the different methods of installing software based on the application’s architecture.
Students will be able to:
In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.
Students will be able to:
In this lesson, students will learn about browser security features and ways to configure their browsers to enhance security.
Students will be able to:
In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.
Students will be able to:
In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.
Students will be able to:
This hands-on lab will introduce students to the command line interface (CLI) by teaching them basic navigation commands. They will learn to move around their computer’s directories and open files using text-based commands.
Students will be able to:
cd
, ls
, open
..) In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this lesson, students will explore how computers use the binary number system to store and communicate information. Through hands-on activities, they will learn how sequences of 0s and 1s represent data in a computer, understanding the fundamental concept of binary code. This foundational knowledge will enable students to grasp how computers interpret complex information and the importance of secure data encoding in cybersecurity.
Students will be able to:
In this lesson, students will learn how to convert between binary and decimal numbers, understand binary place values, and apply these concepts to encode and decode messages using ASCII.
Students will be able to:
In this lesson, students will learn how computers break down images into concrete values that can be stored. Students will learn how images are represented digitally using pixels.
Students will be able to:
In this lesson, students will explore the fundamental concepts of the internet, including its infrastructure and operation. Through videos, readings, and interactive activities, students will gain an understanding of wired and wireless networks, the role of submarine cables, and the foundational ideas behind the internet. The lesson culminates in a reflection activity where students articulate their understanding of the internet.
Students will be able to:
In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol. They will also gain insight into IP addresses, including their function, how to read them, and their role in network communication.
Students will be able to:
In this lesson, students explore how messages get from one address on the internet to another. Students explore the format for creating and reading packets, as defined by open protocols.
Students will be able to:
In this lesson, students will explore how websites function, learning about key concepts such as IP addresses, web servers, DNS, and HTTP. Through interactive activities, students will gain a deeper understanding of how data travels across the internet and the role of protocols in delivering web content.
Students will be able to:
In this lesson, students will explore the OSI (Open Systems Interconnection) Model, which is a conceptual framework used to understand how different networking protocols interact and work together. Students will learn about the seven layers of the OSI Model, the functions of each layer, and how it applies to real-world scenarios such as troubleshooting network issues.
Students will be able to:
In this lesson, students will explore the various impacts of the internet on society, including social, educational, and personal aspects. Through readings and the Compass Points thinking routine, students will articulate their thoughts and reflect on their understanding of the internet’s influence.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).
Students will be able to:
In this hands-on lab, you will learn how to safely and efficiently disassemble a computer. You will practice using various tools, follow safety procedures, and understand the components and their functions. By the end of this lab, you will have a better understanding of computer hardware and the assembly process.
Students will be able to:
In this lesson, students will learn and explain the purposes and use of various peripheral types. They will classify the peripherals as input or output devices and explore different ways of installing them on a laptop or PC.
Students will be able to:
In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.
Students will be able to:
In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.
Students will be able to:
In this lab, you will design and explore the components of a distribution frame, a key element in managing telecommunication wiring. You will learn about the different parts, like the main distribution frame (MDF) and patch panels, and how they connect devices and cables in a network.
Students will be able to:
In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.
Students will be able to:
Master your printer! This lab teaches you to adjust settings for duplex printing, collation, and orientation (portrait vs. landscape) to personalize your printing experience.
Students will be able to:
Master your mobile device! This lab teaches you to navigate settings and customize features like Wi-Fi, Bluetooth, and email for a personalized smartphone experience.
Students will be able to:
In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.
Students will be able to:
In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
In this lesson, students explore what it means to be a cybersecurity professional. Students learn about a wide variety of cybersecurity careers, what each job entails, and what skills sets are needed to be successful. Students learn about the importance of communication and practice responding to a customer support call.
Students will be able to:
In this lesson, students are introduced to a systematic troubleshooting methodology through simulated IT support scenarios. Students will learn to identify problems, research solutions, test theories, and document the resolution process. By the end of the lesson, students will have applied this methodology to solve multiple IT issues.
Students will be able to:
In this lesson, students continue to develop their customer service skills by writing a knowledge base article. Students will research a common network issue and create an article that effectively details the steps to resolve it. Students will also go through a peer review process as a way to practice giving and receiving feedback.
Students will be able to:
In this lesson, students learn about the planning and recording process of making an instructional video. Students will create their own video by first planning the topic and audience as well as writing a script and storyboard. Students will then learn how to record and edit their video.
Students will be able to:
In this lesson, students will explore the different types and states of data and its value as a resource. Students will develop a critical understanding of data’s role in society and its ethical implications.
Students will be able to:
In this lesson, students are introduced to database management systems and the fundamentals of SQL. They will learn how to create tables, insert data, and retrieve information using basic SQL queries.
Students will be able to:
In this lesson, students will explore how attackers can exploit weaknesses in websites and programs. They will learn about SQL Injection and Cross-Site Scripting (XSS), as well as programming errors that can cause vulnerabilities.
Students will be able to:
In this lesson, students will dive into the world of developer tools, the secret weapons of web designers and programmers! Students will explore the code behind websites, participate in a capture-the-flag style game, and learn how to use developer tools to inspect and manipulate websites.
Students will be able to:
In this lesson, students will learn about the importance of physical security as well as environmental controls. Students will understand that the security and functionality of a network goes beyond simply having the necessary devices - it includes proper security and maintenance of the devices.
Students will be able to:
In this lesson, students learn about vulnerabilities, cyber threats, and attacks on networks and organizations. Students simulate identifying and exploiting vulnerabilities.
Students will be able to:
In this lesson, students are introduced to the Risk Management process. They will learn how to identify, analyze, reduce, and monitor risk.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
In this project, students will design and create a board game or a card game that will help players to identify randomized security vulnerabilities and their appropriate defenses.
Students will be able to:
In this lesson, students will explore potential career paths, educational opportunities, and the value of certifications. Students will engage with various resources to gain a comprehensive understanding of the field and begin to envision their own cybersecurity journey.
Students will be able to: