Updating search results...

Search Resources

162 Results

View
Selected filters:
  • Cybersecurity
PAGE ACSE -  Cybersecurity
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The VR experience in this project sounds like a great way to offer a more interactive learning environment. It's exciting to think about how teachers can use this technology (YouTube 360) to enhance their teaching methods and help students learn in new and exciting ways. The hands-on experience will certainly help teachers better understand the features and functionalities of VR, and how it can be effectively used in the classroom.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Earth and Space Systems
STEM/STEAM
Science
Material Type:
Lesson Plan
Author:
Jennifer Weikle
Date Added:
04/23/2024
PAGE ACSE -  Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Overview of the activity:After the lesson has been taught, discuss with the class if their friend was able to crack the code, or if it was secure enough and how could you make it more secure?

Subject:
Computing Systems
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Author:
Wendy Johnson
Date Added:
11/14/2023
PAGE ACSE -  Cybersecurity and social media
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Create a fake social media page for a teacher in Spanish that students will then learn how to protect their information through playing an online simulation game.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
English
STEM/STEAM
Spanish
World Languages
Writing
Material Type:
Activity/Lab
Game
Interactive
Lesson
Lesson Plan
Simulation
Visual Media
Author:
Elizabeth Galbraith
Date Added:
11/06/2024
PAGE ACSE -  Cybersecurity for young children
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Do you know what is safe to share online?  Let’s learn about cybersecurity in a fun scientific process that is just right for kindergarten students.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Interactive
Lesson
Lesson Plan
Author:
Jennifer Plum
Date Added:
02/12/2024
PAGE ACSE -  Cybersecurity in the Wild
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How are predators in the WILD and ONLINE similar? Check out this lesson that incorporates Cybersecurity and pack animals! You will learn ways on how both the animals and you can be protected from danger!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Data and Analysis
Living Systems and Processes
STEM/STEAM
Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Lecture
Lesson
Lesson Plan
Author:
Nichole Brumfield
Date Added:
11/22/2024
PAGE ACSE -  Find that Continent!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity will get your students out of their seats! They will be actively engaged with their classmates to solve the puzzle as well as navigate the sphero mini robot around on the rug! This lesson will have everyone singing about the continents way after the unit is complete!

Subject:
Algorithms and Programming
Computer Science
Cross-Curricular
Cybersecurity
Geography
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Interactive
Author:
Mary Longanecker
Date Added:
02/20/2024
PAGE ACSE -Maggie Walker and Passwords
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Today we do lots of activities online. Students need to know the importance of having a secure password to keep their information safe when using the internet. In this lesson students will learn to make a safe password with a hands on activity.

Subject:
American History
Computer Science
Cross-Curricular
Cybersecurity
Economics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Author:
Nichole Brumfield
Date Added:
04/18/2024
PAGE ACSE - Oceans Escape Room Password Safety
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a review lesson intended to be used at the end of the unit on Oceans. Students work in teams to complete activities that will result in the creation of a code or password. The codes will open a series of four locks to open a large lock box. A smaller lock box with a more difficult password can be solved to reveal a prize. This lesson also incorporates the topic of cybersecurity using password safety.

Subject:
Computer Science
Cybersecurity
Earth and Space Systems
STEM/STEAM
Science
Material Type:
Lesson Plan
Author:
Sunshine Keeney
Date Added:
04/09/2024
PAGE ACSE - Password Breakout
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A breakout box is a great way to get students thinking and problem solving! What a fun, engaging way to get all classmates involved! Everyone will have busy hands and brains while working on this activity! What a great way to get your students thinking and problem solving as a team!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Economics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Game
Interactive
Lesson
Lesson Plan
Reading
Author:
Mary Longanecker
Date Added:
03/20/2024
PAGE ACSE- Strong Passwords, Sensory Learning, & Civil Rights Icons
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Using sensory bins, wiki sticks, and magical water painting art, students will merge their knowledge of Virginia’s civil rights icons with strong password dos and don’ts.  

Subject:
Cybersecurity
Virginia History
Material Type:
Activity/Lab
Interactive
Lesson
Author:
Elizabeth Kite
Date Added:
02/11/2024
PAGE ACSE - Symbols and Digital Safety
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This hands-on lesson merges digital safety concepts with Virginia state symbols and allows students to construct their own three-dimensional learning landscape with fun materials like Legos and model magic.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Interactive
Lesson
Lesson Plan
Author:
Kim Painter
Date Added:
04/09/2024
PAGE ACSE - To Share or Not to Share
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson on keeping personal information safe includes a video and a decision making chart.  Help students understand what is and is not ok to share.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Nichole Brumfield
Tracy Shifflett
Date Added:
04/18/2024
PAGE ACSE -  cyber security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson offers a fun, hands-on approach to teaching students about the importance of creating strong passwords in a real life setting.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Assessment
Lesson
Lesson Plan
Author:
Brenda Williams
Date Added:
04/09/2024
Page ACSE- Solid to the Core
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use their understanding of password security to create a model of the layers of the Earth. Each layer essential to our Earth’s systems and processes just as the components of a strong password are important to enhance cybersecurity. 

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Earth and Space Systems
STEM/STEAM
Science
Material Type:
Activity/Lab
Author:
Andrea Comer
Date Added:
04/29/2024
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Part 3:  Password Safety: Unplugged Decryption
Unrestricted Use
CC BY
Rating
0.0 stars

In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Password Guessing Game 3.11, 4.11
Unrestricted Use
CC BY
Rating
0.0 stars

Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.4.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.Private information such as your phone number, address, favorite foods, or where you like to vacation should be carefully guarded. Passwords are a way to protect devices and information from unauthorized access. There are many ways a password can be guessed or stolen from a user.This activity allows students to take turns guessing simple passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/02/2022