In this lesson, students will explore various cybersecurity threats, with a focus on phishing attacks and misinformation online. Through videos, quizzes, simulations, and discussions, students will develop skills to identify and mitigate online security risks.
Students will be able to:
- Identify common cybersecurity threats, including phishing and DNS spoofing.
- Analyze the characteristics of phishing emails and scam messages.
- Evaluate the impact of deepfake technology and misinformation.
- Apply best practices for maintaining online security.
This lesson introduces students to fundamental cybersecurity concepts, including the CIA Triad (Confidentiality, Integrity, Availability), Personally Identifiable Information (PII), and security threats such as phishing and identity theft. Through interactive activities, students will explore encryption, security breaches, and methods to protect sensitive information.
Students will be able to:
- Define key cybersecurity concepts, including the CIA Triad and PII.
- Explain how cyber threats impact security principles.
- Demonstrate an understanding of encryption techniques through hands-on activities.
- Identify security risks and propose mitigation strategies.
This lesson explores digital identity, password security, and the risks of password sharing. Students will examine how online accounts verify identity, assess real-world security breaches, and research cyber threats.
Students will be able to:
- Explain the importance of digital identity and secure authentication.
- Identify security risks associated with password sharing and data breaches.
- Research and describe various cyber-attacks used to gain unauthorized access.
This lesson introduces students to key cybersecurity concepts related to password security, authentication, and authorization. Students will explore how to protect their data, analyze password strength, and understand multifactor authentication through hands-on activities and discussions.
Students will be able to:
- Define and differentiate between authentication and authorization.
- Evaluate password strength and understand best practices for password security.
- Explain the importance of multifactor authentication and its role in cybersecurity.
In this lesson, students will explore the importance of decision-making, ethical considerations in cybersecurity, and optimization strategies using real-world and computational problems. They will analyze network security threats, discuss accountability, and apply graph theory to solve the Muddy City problem.
Students will be able to:
- Discuss ethical implications of network security breaches.
- Identify stakeholders and accountability in cybersecurity incidents.
- Solve an optimization problem using the Minimal Spanning Tree algorithm.
- Apply decision-making strategies in real-world and computational scenarios.
In this lesson, students will explore the OSI Model through an engaging real-world analogy that simulates data transmission over a network. Students will apply critical thinking to analyze network issues and their impact on communication. The activity encourages problem-solving by having students adjust to various network disruptions and constraints.
Students will be able to:
- Describe the seven layers of the OSI Model and their functions.
- Apply the OSI Model to real-world networking scenarios.
- Analyze the impact of network disruptions and propose solutions.
This lesson introduces students to various types of network attacks, their impact on networks, and how they can be prevented. Students will engage in activities that promote critical thinking about cybersecurity threats and ethical considerations.
Students will be able to:
- Identify and describe different types of network attacks.
- Analyze the OSI model layers targeted by specific attacks.
- Evaluate the ethical and legal consequences of cyberattacks.
- Create a one-pager summarizing key information about a specific network attack.
In this lesson, students will explore fundamental cybersecurity risk concepts, including identifying risks, understanding personal data threats, and assessing the consequences of data exposure. Through interactive discussions and hands-on activities, students will analyze real-world cybersecurity scenarios and their implications.
Students will be able to:
- Define and describe cybersecurity risks.
- Identify different types of personal data threats and vulnerabilities.
- Assess the consequences of data exposure and explain risk mitigation strategies.
In this lesson, students will analyze different cybersecurity risks and assess their impact using a structured approach. Through discussion, videos, and risk scenario assessments, students will evaluate threats such as malware, identity theft, ransomware, and email compromise, identifying vulnerabilities and security controls.
Students will be able to:
- Analyze potential cybersecurity risks and assess their impact.
- Identify vulnerabilities and security controls associated with different types of cyber threats.
- Evaluate the benefits and risks of data collection by businesses.
This lesson introduces students to cybersecurity vulnerabilities, focusing on how weaknesses in software, networks, and user behavior can be exploited. Students will explore real-world vulnerabilities using the National Vulnerability Database (NVD) and understand how cybersecurity professionals assess and mitigate risks.
Students will be able to:
- Define vulnerabilities in the context of cybersecurity.
- Identify real-world examples of vulnerabilities using the National Vulnerability Database.
- Analyze the impact of vulnerabilities on cybersecurity risk models.
This lesson introduces students to cybersecurity risk models and security controls. Students will explore the Internet of Things (IoT), discuss its benefits and risks, examine layered security strategies, and analyze ethical concerns related to artificial intelligence (AI) and algorithmic bias.
Students will be able to:
- Identify and discuss cybersecurity risks associated with IoT devices.
- Evaluate security controls in a defense-in-depth strategy for various cybersecurity threats.
- Analyze ethical issues related to AI, including bias and security concerns.