-
4.1 What is Cybersecurity?
-
Video
4.1.1 What is Cybersecurity?
-
Check for Understanding
4.1.2 What is Cybersecurity?
-
Connection
4.1.3 City Services Ransomware
-
Free Response
4.1.4 Ransomware Reflection
-
Example
4.1.5 Ransomware Simulator
-
Connection
4.1.6 Internet of Things
-
Connection
4.1.7 Hackers vs. Smart Homes
-
Free Response
4.1.8 Internet of Things Reflection
-
Connection
4.1.9 Threat Map
-
Free Response
4.1.10 Why Learn about Cybersecurity?
-
4.2 Impact of Cybersecurity
-
Video
4.2.1 Impact of Cybersecurity
-
Check for Understanding
4.2.2 Impact of Cybersecurity
-
Connection
4.2.3 Phishing for Your Info
-
Free Response
4.2.4 Phishing Reflection
-
Connection
4.2.5 Cyber Game
-
Free Response
4.2.6 Cyber Game Reflection
-
Connection
4.2.7 Cyber Crime Time
-
Free Response
4.2.8 Cyber Crime Time Reflection
-
Example
4.2.9 Phishing Simulator
-
4.3 Hacking Ethics
-
Video
4.3.1 Hacking Ethics & Legality
-
Check for Understanding
4.3.2 Hacking Ethics & Legality
-
Connection
4.3.3 Penetration Testing
-
Free Response
4.3.4 Reflection: Penetration Testing
-
Connection
4.3.5 Hack the Pentagon?
-
Free Response
4.3.6 Reflection: Hack the Pentagon
-
4.4 The CIA Triad
-
Video
4.4.1 CIA Triad
-
Check for Understanding
4.4.2 CIA Triad
-
Free Response
4.4.3 Which part of the CIA Triad?
-
Free Response
4.4.4 Which part of the CIA Triad?
-
Free Response
4.4.5 Breach of Confidentiality
-
Free Response
4.4.6 Breach of Availability
-
4.5 Privacy & Security
-
Video
4.5.1 What is Data Privacy & Security?
-
Check for Understanding
4.5.2 Privacy & Security Quiz
-
Connection
4.5.3 How Strong is your Password?
-
Free Response
4.5.4 How Strong is your password?
-
Connection
4.5.5 Google Privacy Policy Search
-
Free Response
4.5.6 Google Privacy Policy Search
-
Resource
4.5.7 Is Your Head in the Cloud?
-
4.6 Cryptography, Cryptology, Cryptanalysis
-
Video
4.6.1 Cryptography, Cryptology, Cryptanalysis
-
Check for Understanding
4.6.2 Cryptography, Cryptology, Cryptanalysis
-
Connection
4.6.3 Securing the Cloud
-
Free Response
4.6.4 Encryption Reflection
-
4.7 Hash Functions
-
Video
4.7.1 Hash Functions
-
Check for Understanding
4.7.2 Hash Functions
-
Connection
4.7.3 Google Shattered Crypto Algorithm
-
Free Response
4.7.4 Hash Functions in the News
-
Connection
4.7.5 Using a Hash Generator
-
Free Response
4.7.6 Hash Generator
-
4.8 Cyberbullying
-
Video
4.8.1 Cyberbullying
-
Check for Understanding
4.8.2 Cyberbullying
-
Free Response
4.8.3 Scenario: Student Ranking
-
Free Response
4.8.4 Scenario: Singled Out
-
Free Response
4.8.5 Stopping Cyberbullying
-
4.9 Creative Credit & Copyright
-
Video
4.9.1 Creative Credit and Copyright
-
Check for Understanding
4.9.2 Creative Credit and Copyright
-
Free Response
4.9.3 Cite!
-
Connection
4.9.4 Exploring Creative Commons
-
Free Response
4.9.5 Respond: Creative Commons
-
Free Response
4.9.6 Finding Images
-
Free Response
4.9.7 Reflection: Why is Copyright Important?