-
1.1 What is Cybersecurity?
-
Video
1.1.1 What is Cybersecurity?
-
Check for Understanding
1.1.2 What is Cybersecurity?
-
Connection
1.1.3 City Services Ransomware
-
Free Response
1.1.4 Ransomware Reflection
-
Connection
1.1.5 Internet of Things
-
Connection
1.1.6 Hackers vs. Smart Homes
-
Free Response
1.1.7 Internet of Things Reflection
-
Connection
1.1.8 Threat Map
-
Free Response
1.1.9 Why Learn about Cybersecurity?
-
1.2 The CIA Triad
-
Video
1.2.1 CIA Triad
-
Check for Understanding
1.2.2 CIA Triad
-
Free Response
1.2.3 Which part of the CIA Triad?
-
Free Response
1.2.4 Which part of the CIA Triad?
-
Free Response
1.2.5 Breach of Confidentiality
-
Free Response
1.2.6 Breach of Availability
-
Resource
1.2.7 A Balancing Game
-
1.3 Digital Footprint and Reputation
-
Video
1.3.1 Digital Footprint and Reputation
-
Check for Understanding
1.3.2 Digital Footprint and Reputation
-
Free Response
1.3.3 Building a Positive Digital Footprint
-
Connection
1.3.4 Right to be Forgotten?
-
Free Response
1.3.5 Right to be Forgotten
-
Free Response
1.3.6 What is your Digital Footprint?
-
1.4 Cyberbullying
-
Video
1.4.1 Cyberbullying
-
Check for Understanding
1.4.2 Cyberbullying
-
Free Response
1.4.3 Scenario: Student Ranking
-
Free Response
1.4.4 Scenario: Singled Out
-
Free Response
1.4.5 Stopping Cyberbullying
-
1.5 Internet Safety
-
Video
1.5.1 Internet Safety
-
Check for Understanding
1.5.2 Internet Safety
-
Free Response
1.5.3 Scenario: School Stranger
-
Free Response
1.5.4 Scenario: Vacation Pals
-
Free Response
1.5.5 Staying Safe
-
1.6 Privacy & Security
-
Video
1.6.1 What is Data Privacy & Security?
-
Check for Understanding
1.6.2 Privacy & Security Quiz
-
Connection
1.6.3 How Strong is your Password?
-
Free Response
1.6.4 How Strong is your password?
-
Example
1.6.5 Guess: Password List
-
Example
1.6.6 Guess: Using an Algorithm
-
Example
1.6.7 Guess: Brute Force
-
Connection
1.6.8 Google Privacy Policy Search
-
Free Response
1.6.9 Google Privacy Policy Search
-
Resource
1.6.10 Is Your Head in the Cloud?
-
Example
1.6.11 You Can Be Tracked!
-
1.7 Information Literacy
-
Video
1.7.1 Information Literacy
-
Check for Understanding
1.7.2 Information Literacy
-
Free Response
1.7.3 Effective Internet Searches
-
Connection
1.7.4 Evaluate the Source 1
-
Free Response
1.7.5 Respond: Evaluate the Source 1
-
Notes
1.7.6 Evaluate the Source 2
-
Free Response
1.7.7 Respond: Evaluate the Source 2
-
Connection
1.7.8 Hero Pig?
-
1.8 Visualizing and Interpreting Data
-
Video
1.8.1 Visualizing Data
-
Quiz
1.8.2 Visualizing Data Quiz
-
Notes
1.8.3 Exploring Data Visualizations
-
Connection
1.8.4 US Recorded Music Revenue
-
Connection
1.8.5 National Parks
-
Connection
1.8.6 March Madness
-
Connection
1.8.7 Captain Marvel
-
Free Response
1.8.8 Respond: Visualizations
-
Free Response
1.8.9 Choosing a Visualization
-
Quiz
1.8.10 End of Lesson Quiz
-
1.9 Data Collection & Limitations
-
Video
1.9.1 Collecting Data
-
Quiz
1.9.2 Collecting Data Quiz
-
Free Response
1.9.3 Design a Survey
-
Free Response
1.9.4 Self-Driving Cars
-
Quiz
1.9.5 Data Collection Quiz
-
Video
1.9.6 Data Limitations
-
Example
1.9.7 Line Graph
-
Example
1.9.8 Bar Graph
-
Example
1.9.9 Pie Chart
-
1.10 Creative Credit & Copyright
-
Video
1.10.1 Creative Credit and Copyright
-
Check for Understanding
1.10.2 Creative Credit and Copyright
-
Free Response
1.10.3 Cite!
-
Connection
1.10.4 Exploring Creative Commons
-
Free Response
1.10.5 Respond: Creative Commons
-
Free Response
1.10.6 Finding Images
-
Free Response
1.10.7 Reflection: Why is Copyright Important?
-
1.11 Hacking Ethics
-
Video
1.11.1 Hacking Ethics & Legality
-
Check for Understanding
1.11.2 Hacking Ethics & Legality
-
Connection
1.11.3 Penetration Testing
-
Free Response
1.11.4 Reflection: Penetration Testing
-
Connection
1.11.5 Hack the Pentagon?
-
Free Response
1.11.6 Reflection: Hack the Pentagon
-
Check for Understanding
1.11.7 Ethical Hacker Agreement
-
1.12 Common Security Problems
-
Video
1.12.1 Common Security Problems
-
Check for Understanding
1.12.2 Common Security Problems
-
Connection
1.12.3 Meet Security Engineers at Google
-
Free Response
1.12.4 Security Engineering Reflection
-
Video
1.12.5 Living in a Digital World
-
Free Response
1.12.6 Living in a Digital World
-
1.13 Project: Public Service Announcement
-
Free Response
1.13.1 Pick a Topic
-
Free Response
1.13.2 Research
-
Free Response
1.13.3 Choose Your Audience
-
Free Response
1.13.4 What kind of PSA?
-
Free Response
1.13.5 Draft your PSA
-
Free Response
1.13.6 Finalize your PSA!