Section 3.0.1
Prepare for Implementation
Instructional strategies included in the APCSP course description are found on pages 132 - 160. This covers basic methods, differentiation and computational thinking strategies.
Unit Resources
3.1.1: Reflections and Guided Reading Chapter 1 (Student Worksheet)
3.1.1: Reflections and Guided Reading Chapter 2 (Student Worksheet)
3.1.1: Reflections and Guided Reading Chapters 3-6 (Student Worksheet)
3.1.1: Reflections and Guided Reading Chapters 1-6 (Student Worksheet)
3.1.3: "Blown to Bits" Chapter 3, "Who Owns Your Privacy?" (Student Resource)
3.1.4: How to Read Privacy Policies Like a Lawyer (Teacher Resource)
3.1.4: CS Principles: Big Ideas in Programming (Student Resource)
3.7.1: Video guided notes for Encryption (student worksheet)
3.7.1: Video guided notes for Encryption - TEACHER KEY (teacher resource)
3.9.1: "What is Malware?" from the Proofpoint Cybersecurity Education Series (Teacher Resource)
3.9.1: "What is Malware? The Ultimate Guide to Malware" (Teacher Resource)
3.10.1: Video guided notes for Cybersecurity (student worksheet)
3.10.1: Video guided notes for Cybersecurity KEY (teacher resource)
3.10.2: Scoring rubric for Eve's Evil Tools (teacher resource)
3.11: Unit 3 ARC Challenge Materials (student and teacher resource)
3.11.1: Activities in 3.3 Sprint 2 & 3 form (teacher resource)