Activity | Points | Item Type |
---|---|---|
Caesar Cipher | ||
1.1 Caesar Ciphers | Lesson | |
1.1.1 Introduction to Caesar Ciphers | 5 | Connection |
1.1.2 slides | 5 | Video |
1.1.3 A Caesar Cipher | 5 | Connection |
1.1.4 Encryption and Decryption | 5 | Free Response |
1.1.5 Decryption Practice | 4 | Check for Understanding |
1.1.6 Caesar Cipher Encryption | 5 | Exercise |
1.2 Decrypting and Breaking Caesar Ciphers | Lesson | |
1.2.1 Caesar Cipher Decryption | 5 | Exercise |
1.2.2 Break Caesar's Cipher! | 5 | Exercise |
1.2.3 Reflection: Caesar's Cipher | 5 | Free Response |
1.2.4 Ethics Moment: Apple v. Barr | 5 | Connection |
1.2.5 Reflection: Apple v. Barr | 5 | Free Response |
The CIA Triad | ||
2.1 Introduction to Cybersecurity | Lesson | |
2.1.1 Warm-Up | 5 | Notes |
2.1.2 Gone Phishing | 5 | Video |
2.1.3 Deepfake Videos | 5 | Connection |
2.1.4 Keeping Secrets | 5 | Free Response |
2.1.5 Phishing Quiz | 5 | Connection |
2.1.6 How is Your Phishing IQ? | 5 | Connection |
2.1.7 Phishing Simulator | 1 | Example |
2.1.8 Reflection: Phishing Emails | 5 | Free Response |
2.1.9 Think-Pair-Share Activity | 5 | Free Response |
2.2 CIA Triad | Lesson | |
2.2.1 Warm-Up | 5 | Notes |
2.2.2 CIA Triad | 5 | Video |
2.2.3 Alice-Bob-Eve | 5 | Free Response |
2.2.4 PII | 5 | Free Response |
2.2.5 CIA Breach | 5 | Free Response |
2.2.6 Identity Theft | 5 | Free Response |
2.2.7 CIA and Phishing | 5 | Free Response |
2.2.8 Challenge: Create a Phishing Email | 5 | Free Response |
2.2.9 Challenge: Investigate Legalities | 5 | Free Response |
CyberEthics | ||
3.1 CyberEthics | Lesson | |
3.1.1 Presentation | 5 | Video |
3.1.2 Topics | 5 | Free Response |
3.1.3 Problem Summary | 5 | Free Response |
3.1.4 Pros and Cons | 5 | Free Response |
3.1.5 Your Solution | 5 | Free Response |
3.1.6 Writing an Introduction | 5 | Free Response |
3.1.7 Developing your position | 5 | Free Response |
3.1.8 Conclusion | 5 | Free Response |
3.1.9 Position Paper | 5 | Free Response |
Data Structures | ||
4.1 Introduction to Lists | Lesson | |
4.1.1 Intro to Lists | 5 | Video |
4.1.2 List Introduction | 9 | Check for Understanding |
4.2 Traversing a List | Lesson | |
4.2.1 Traversing a List | 5 | Video |
4.2.2 Traversing a List | 11 | Check for Understanding |
4.3 Applying Iteration - Usernames and Passwords | Lesson | |
4.3.1 Username and Password Creation | 5 | Video |
4.3.2 Usernames and Passwords: Pseudocode | 5 | Free Response |
4.3.3 Usernames and Passwords: JavaScript | 5 | Exercise |
4.3.4 Username and Password Verification | 10 | Challenge |
4.3.5 Ethics Moment: Facebook and AWS | 5 | Connection |
4.3.6 Reflection: Facebook and AWS | 5 | Free Response |
Identity, Authentication and Authorization | ||
5.1 Identity Crisis | Lesson | |
5.1.1 Warm Up | 5 | Notes |
5.1.2 Identity Crisis | 5 | Video |
5.1.3 Sharing Passwords | 5 | Connection |
5.1.4 Reflect: Sharing Passwords | 5 | Free Response |
5.1.5 What is your password? | 5 | Connection |
5.1.6 Identity crisis activity | 5 | Free Response |
5.1.7 World's Biggest Data Breaches | 5 | Free Response |
5.1.8 Research: Types of Attacks | 5 | Free Response |
5.1.9 You Can Be Tracked! | 1 | Example |
5.2 Let Me In | Lesson | |
5.2.1 Warm Up | 5 | Notes |
5.2.2 Authenticate and Authorize | 5 | Video |
5.2.3 How do you protect your data? | 5 | Free Response |
5.2.4 Common Passwords | 5 | Free Response |
5.2.5 Password Strength | 1 | Connection |
5.2.6 Reflection: Password Strength | 5 | Free Response |
5.2.7 What Makes a Password Strong? | 5 | Video |
5.2.8 Multifactor Authentication | 1 | Example |
5.2.9 One Pager: Password Security | 5 | Exercise |
Input Validation & Conditionals | ||
6.1 Applying Conditionals - Password Validation | Lesson | |
6.1.1 Input Validation and Conditionals | 5 | Video |
6.1.2 Conditional Pseudocode Activity | 7 | AP Practice |
6.1.3 Password Checker | 5 | Exercise |
6.1.4 How are passwords saved? | 5 | Connection |
6.1.5 Reflect: How are passwords saved? | 5 | Free Response |
6.2 Password Protection | Lesson | |
6.2.1 Password Protection | 5 | Video |
6.2.2 Create a password | 5 | Exercise |
6.2.3 Ethics Moment: Impact of Code | 5 | Connection |
6.2.4 Reflection: Impact of Code | 5 | Free Response |
Iterative Process | ||
7.1 Iterative Process | Lesson | |
7.1.1 Iterations | 5 | Video |
7.1.2 Iterative Pseudocode Activity - Part 1 | 9 | AP Practice |
7.1.3 Iterative Pseudocode Activity - Part 2 | 10 | AP Practice |
7.1.4 Verify the Password Length | 5 | Exercise |
7.1.5 Making a Stronger Password | 5 | Exercise |
7.1.6 Passwords with Letters and Numbers | 5 | Exercise |
7.1.7 Ethics Moment: Sampling Music | 5 | Connection |
7.1.8 Reflection: Sampling Music | 5 | Free Response |
Secure Networking | ||
8.1 Introduction to Networking | Lesson | |
8.1.1 Warm Up | 5 | Notes |
8.1.2 Ethics Moment: Equifax Data Breach | 5 | Connection |
8.1.3 Reflection: Equifax Data Breach | 5 | Free Response |
8.1.4 Muddy City | 5 | Exercise |
8.1.5 Reflection: Muddy City | 5 | Free Response |
8.2 OSI model activity | Lesson | |
8.2.1 Introduction | 5 | Free Response |
8.2.2 Event 1: Truck Payload Change | 5 | Free Response |
8.2.3 Event 2: Truck Payload Change | 5 | Free Response |
8.2.4 Event 3: Route Change | 5 | Free Response |
8.2.5 Event 4: Envelopes Never Arrive | 5 | Free Response |
8.2.6 Event 5: Missing One Box | 5 | Free Response |
8.2.7 Event 6: Box Payload Change | 5 | Free Response |
8.2.8 Organizing the Events | 5 | Free Response |
8.2.9 Relating this to the Internet | 5 | Video |
8.3 Network Attacks | Lesson | |
8.3.1 Warm Up | 5 | Notes |
8.3.2 One Pager: Network Attacks | 5 | Exercise |
8.3.3 Reflection: Network Attacks | 5 | Free Response |
Personal Data Vulnerabilities | ||
9.1 Unintentional Data Sharing | Lesson | |
9.1.1 Warm up | 5 | Notes |
9.1.2 Personal Data Vulnerabilities | 5 | Video |
9.1.3 Spokeo | 5 | Free Response |
9.1.4 Cyber Insecurity | 5 | Connection |
9.1.5 Who is this Person? | 5 | Free Response |
9.1.6 Who is this Person? - Car | 5 | Free Response |
9.1.7 Who is this Person? - Hobby | 5 | Free Response |
9.1.8 What can you learn from ... | 5 | Free Response |
9.1.9 Social Media Clean-up | 1 | Example |
9.2 Metadata and Data Collection | Lesson | |
9.2.1 Warm Up | 5 | Notes |
9.2.2 Understanding Metadata | 5 | Video |
9.2.3 Image Data Extraction | 5 | Free Response |
9.2.4 Information about your images | 5 | Free Response |
9.2.5 Security Vulnerability | 5 | Free Response |
9.2.6 Ethics Moment: Collection of Data | 5 | Connection |
9.2.7 Reflection: Collection of Data | 5 | Free Response |
9.2.8 Online Privacy | 5 | Connection |
Risk | ||
10.1 Basic Cybersecurity Risk Concepts | Lesson | |
10.1.1 Warm up | 5 | Notes |
10.1.2 Basic Cybersecurity Risk, Part 1 | 5 | Video |
10.1.3 Personal Data Threats | 5 | Free Response |
10.1.4 Basic Cybersecurity Risk, Part 2 | 5 | Video |
10.1.5 Risk and Consequences: Part 1 | 5 | Free Response |
10.1.6 Risk and Consequences: Part 2 | 5 | Free Response |
10.1.7 Digital Footprint | 5 | Free Response |
10.2 Cybersecurity Risk Model-Assessing Risk | Lesson | |
10.2.1 Warm up | 5 | Notes |
10.2.2 Assessing Risk, Part 1 | 5 | Video |
10.2.3 Think, Pair, Share: Assets | 5 | Notes |
10.2.4 Assessing Risk, Part 2 | 5 | Video |
10.2.5 Risk Scenario Assessment 1: Malware | 5 | Free Response |
10.2.6 Risk Scenario Assessment 2: Identity Theft | 5 | Free Response |
10.2.7 Risk Scenario Assessment 3: Ransomware | 5 | Free Response |
10.2.8 Risk Scenario Assessment 4: Email Compromise | 5 | Free Response |
10.2.9 Asset Identification Activity | 5 | Free Response |
10.3 Cybersecurity Risk Model-Vulnerabilities | Lesson | |
10.3.1 Warm up | 5 | Notes |
10.3.2 Vulnerabilities | 5 | Video |
10.3.3 National Vulnerability Database Activity | 5 | Check for Understanding |
10.3.4 Exploring Vulnerabilities | 5 | Free Response |
10.4 Cybersecurity Risk Model-Security Controls | Lesson | |
10.4.1 Warm up | 5 | Notes |
10.4.2 Internet of Things | 5 | Connection |
10.4.3 Security Controls | 5 | Video |
10.4.4 Defense in Depth | 5 | Free Response |
10.4.5 Ethics Moment: The Risk of AI | 5 | Connection |
10.4.6 Reflect: The Risk of AI | 5 | Free Response |
Steganography | ||
11.1 Introduction to Steganography | Lesson | |
11.1.1 Introduction to Steganography | 5 | Connection |
11.1.2 What is steganography? | 5 | Connection |
11.1.3 Hide Text | 1 | Example |
11.1.4 Steganography | 5 | Video |
11.1.5 Creating a Secret Message | 5 | Free Response |
11.1.6 Part 1: Loading images | 5 | Exercise |
11.2 Ethics of Steganography | Lesson | |
11.2.1 Steganography - Part 2 | 5 | Video |
11.2.2 Government Surveillance and Reality Winner | 1 | Connection |
11.2.3 Government Surveillance and Reality Winner | 5 | Free Response |
11.2.4 Ethics Moment: Government Surveillance | 5 | Connection |
11.2.5 Reflection: Government Surveillance | 5 | Free Response |
11.2.6 Upload your own photos | 5 | Exercise |
11.2.7 Part 2: The encrypt function | 5 | Exercise |
11.3 Steganography Exploration | Lesson | |
11.3.1 Data Hiding and Extraction | 1 | Connection |
11.3.2 Reflect: Data Hiding and Extraction | 5 | Free Response |
11.3.3 Part 3: The decrypt function | 5 | Exercise |
Symmetric and Public Key Encryption | ||
12.1 Symmetric and Public Key Encryption | Lesson | |
12.1.1 Symmetric and Public Key Encryption | 5 | Video |
12.1.2 Diffie-Hellman Key Exchange | 5 | Connection |
12.1.3 Diffie-Hellman Key Exchange | 1 | Example |
12.1.4 Public Key Programming Exercise | 5 | Exercise |
12.1.5 RSA Encryption: Step 1 | 5 | Connection |
12.1.6 RSA Encryption: Step 2 | 5 | Connection |
12.1.7 RSA Encryption: Step 3 | 5 | Connection |
12.1.8 RSA Encryption: Step 4 | 5 | Connection |
12.1.9 Public-Key Encryption Explorer | 1 | Notes |
12.1.10 Public-Key Encryption Explorer Reflection | 5 | Free Response |
12.1.11 Ethics Moment: Ransomware | 5 | Connection |
12.1.12 Reflection: Ransomware | 5 | Free Response |
Vigenère Cipher | ||
13.1 Vigenère Cipher | Lesson | |
13.1.1 Vigenère Cipher | 5 | Video |
13.1.2 One-Time Pad Cipher | 5 | Connection |
13.1.3 How a Vigenère Cipher Works | 5 | Connection |
13.1.4 Vigenère Scavenger Hunt | 5 | Free Response |
13.1.5 Vigenère Pseudocode | 5 | Free Response |
13.1.6 Write your own Vigenère Cipher | 5 | Exercise |
13.1.7 Reflection: Vigenère Cipher | 5 | Free Response |
13.1.8 Ethics Moment: Cryptography and the NSA | 5 | Connection |
13.1.9 Reflection: Cryptography and the NSA | 5 | Free Response |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup