Updating search results...

Search Resources

161 Results

View
Selected filters:
  • Cybersecurity
C.S. SOL 2.9 PowerPoint on Computer Rules
Unrestricted Use
CC BY
Rating
0.0 stars

This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly. 

Subject:
Computer Science
Cybersecurity
Material Type:
Visual Media
Author:
Dana Smith
Date Added:
12/28/2021
CS Strand Pocket Guides
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Cybersecurity
Data and Analysis
Impacts of Computing
Networking and the Internet
Material Type:
Teaching/Learning Strategy
Author:
CodeVA Curriculum
Valerie Fawley
Date Added:
11/18/2022
Caesar Cipher - Unplugged
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.

Subject:
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Caesar Cipher in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Ciphers and Encryption Part 1:  Pigpen Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about spies and secret codes from the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 2:  Vigenère Square
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about how to decode a Vigenère Square Cipher.Next students will be able to use the cipher to crack a secret message of their own (teacher provided messages in a hat (not inlcuded)).  One student chooses the word or phrase, the teacher puts the key (word) on the board, that same student will encrypt the message and send it to their partner.  The partner with use the same key word to return the text to plain text revealing the message and send their guess back to their partner. Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five (part 2) and can be used alone, or with other lessons in the series. Vigenère Square Ciphefrom the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five. Vigenère Square Ciphe

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 3:  Morse Code
Unrestricted Use
CC BY
Rating
0.0 stars

The student will watch a brief video about the first Morse Code ever sent and how it impacted American communications, even today.  Students will be able to decipher a short Morse Code code (SOS).  They will also learn about Kryptos, an artwork that contains four secretive messages and is placed on display outside of the CIA headquarters. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Classroom Handouts and Resources
Unrestricted Use
CC BY
Rating
0.0 stars

Provided here for your use, distribution, and remix are three templates produced by Kindred Grey and Anita Walz at the Virginia Tech Newman Library. We ask that you abide by the CC By 4.0 license in which you attribute the creation of the templates to Kindred Grey using the following citation.Agricultural Cyberbiosecurity Template. Kindred Grey. 2023. CC BY 4.0.

Subject:
Agricultural Education
Cybersecurity
Technology Education
Material Type:
Activity/Lab
Homework/Assignment
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
03/07/2023
Computer Use Agreement 2.9
Unrestricted Use
CC BY
Rating
0.0 stars

Computer Use Agreement for Second Grade2.9  The student will explain what is allowed and what is not allowed at school associated with the use of technology (e.g., class rules).

Subject:
Computer Science
Cybersecurity
Material Type:
Assessment
Lesson
Author:
Robert Underwood
Date Added:
05/17/2022
Creating Strong Passwords
Unrestricted Use
CC BY
Rating
0.0 stars

Students will create a strong password to access a computer and/or website. The password must meet specific criteria. Once the students master the criteria, they will reveal their secret password with their teacher, using a highlighter and a blacklight.   

Subject:
Cybersecurity
Material Type:
Activity/Lab
Assessment
Author:
Erika Coble
Date Added:
06/27/2022
Creating Strong Passwords
Unrestricted Use
CC BY
Rating
0.0 stars

This unit is geared toward students in 4th grade.  This lesson has students identify why passwords are important and how we can create and remember strong passwords that keep our information safe while online.  There are mutltiple resources with this lesson including the lesson plan, a slides presentation to guide the lesson, and interactive video guide, and finally a password practice sheet.  This lesson could be divided up over multiple days and can also be differentiated to different age students.

Subject:
Cybersecurity
Material Type:
Interactive
Lesson Plan
Student Guide
Author:
Christina Martin
Date Added:
02/09/2022
Crytography Breakout (US History I)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Culper Spy Ring
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Cyber-Bullying
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson is designed to assist & help students recognize & handle Cyberbullying.  https://goopenva.org/

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Melissa Wilcox
Date Added:
06/14/2021
Cyber Careers
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties. 

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
06/14/2022