Grades 9-12 | Creation & Evaluation of Cybersecurity: Global Impact

Grades 9-12 | Creation & Evaluation of Cybersecurity: Global Impact

$3,995.00

Overview: Students explore cybersecurity concepts and ethical implications of data sharing, integrating math and computer science principles in cryptography.
Grade Band: 9-12
Lessons: 15
Professional Development: Yes
Software Needed: Yes
Equipment Required: No
Number of Students per Equipment Kit: 24
All Included: Yes

Quantity:
Add To Cart

Product Description:

The "Creation & Evaluation of Cybersecurity: Global Impact" course is designed for learners in grades 9-12 to develop and evaluate concepts of cybersecurity. This course provides students with an understanding of the ethical ramifications of sharing data through digital networks globally while exploring foundational mathematical concepts and computer science principles in cryptography. The curriculum combines theoretical knowledge with practical, hands-on activities to engage students in the critical field of cybersecurity.

Course Features:

  • 15 Lesson Hours: The course includes 15 detailed lessons that cover various aspects of cybersecurity, cryptography, and ethical considerations.

  • Curriculum and Supporting Materials: Comprehensive lesson plans, activity guides, and additional resources to support effective teaching and learning.

  • Ongoing Product and Curriculum Support: Continuous support to ensure the curriculum remains relevant and effective.

  • Professional Development: Training sessions for educators to deliver the course content effectively and facilitate student learning.

  • Facilitation by a Trained STEM Instructor (Optional): Option to have a professional STEM instructor lead the course.

Learning Target Examples:

  1. Data Breaches in Business: Define the phrases "data breach" and "personal identifiable information".

  2. Mathematics and Codebreaking: Identify the role mathematics plays in codebreaking.

  3. Cybersecurity and You: Compare the need for cybersecurity in business and personal settings.

  4. Privacy and Data Encryption: Define encryption while exploring the Caesar cipher and Random Substitution Cipher.

  5. Protect Yourself with Secure Passwords: Explore various methods of multi-factor authentication.

  6. Cyberattacks: Identify and explain types of cyber attacks such as brute force, dictionary attack, exploiting software vulnerabilities, Denial-of-Service (DoS), and malware.

  7. Cybersecurity and the IoT (Internet of Things): Determine relationships between hacking and the Internet of Things (IoT).

  8. Digital Forensics: Explain how digital information gathered through digital forensics is used in courts.

  9. Ethics in Cyber Interactions: Debate ethics in regards to the right to privacy or the right to security of PII.

  10. Cyber Legislation: Investigate current proposed cybersecurity legislation.

  11. PII (Personal Identifiable Information) and Social Media: Explore ways that social media increases access to personal information.

  12. Social Engineering: Compare the differences between social engineering and cyber attacks.

  13. Social Media Risks: Identify specific risks to PII in social media platforms such as phishing, pretexting, baiting, and quid pro quo.

  14. Social Media Safety: Identify individual user practices that ensure information is protected on social media platforms.

  15. Trends in Cybersecurity: Identify current and emerging technology trends that will impact cybersecurity practices.

Equipment Included:

  • Cryptography Tools: Software and hardware tools for practicing encryption and decryption techniques.

  • Cybersecurity Software: Access to cybersecurity simulation software and tools for hands-on learning.

  • Supporting Materials: Various materials required for hands-on activities, including case studies, scenario cards, and troubleshooting guides.

Professional Development:

  • Teacher Training: Comprehensive training sessions to equip educators with the skills and knowledge to effectively teach the course.

  • Ongoing Support: Continuous professional development opportunities and support to ensure successful course delivery.

Additional Information:

  • Designed for Learners in Grades 9-12: The course is tailored to meet the developmental and educational needs of students in this age group.

  • Hands-On Activities: Emphasis on interactive and engaging activities to foster a love for learning and exploration in STEM fields.

  • Real-World Applications: Students will learn about the practical uses of cybersecurity in various industries and scenarios.

Grades 6-8 | Smart Automation: Designing an IoT Device

Grades 6-8 | Smart Automation: Designing an IoT Device

$5,995.00
K-2 | STEM Classics

K-2 | STEM Classics

$5,995.00
Grades 9-12 | Innovation & Entrepeureurship

Grades 9-12 | Innovation & Entrepeureurship

$5,495.00
Grades 3-5 |Discovery of Solar Power and Renewable Energy: Designing Systems

Grades 3-5 |Discovery of Solar Power and Renewable Energy: Designing Systems

$5,495.00
Grades 6-8 | Exploration of Invention & Entrepreneurship: From Idea to Market

Grades 6-8 | Exploration of Invention & Entrepreneurship: From Idea to Market

$5,495.00