Cyber Security
5 to 10 days, or longer if you have time
5 to 10 days, or longer if you have time
If you want to use the Teach Cyber Resources in ACC , use the links below to access the files. These are the materials that are being used in the Cyber Range.
Semester Sequence of Teach Cyber Materials - This is the recommended sequence of units from Teach Cyber if you teach a semester course. This document has Units 1-5 listed with Lesson folder links to all lesson resources. The Virtual Machine labs for the Maryland Education Cyber Range are also linked in their respective unit and sequence.
Updated Teach Cyber Resource Folder - This is the link to the folder with everything, including all Labs and Units (Unit 1 through Unit 7).
*Note: Some of the Unit 1 Lesson 1 and 2 materials appear in the Cybersecurity Unit for FOCS. Please check with your FOCS teachers to see if these materials have been used.
Used as an Intro to Cyber-Security
PBL Unit Option:
Driving Question: How will cyber security affect you in 5 years?
Assign each student a digital copy. (The group leader will share with their group)
Discussion Questions
1) What is the WannaCry ransomware attack?
2) According to this video, how do we protect ourselves from attacks like WannaCry?
1) What is the motivation for creating an “Internet of Things” by embedding computing devices in everyday objects? How do we benefit from this increased interconnectivity?
2) What are the risks associated with this kind of connectivity? How does the issue of cybersecurity relate to the Internet of Things?
1) What is the motivation for creating an “Internet of Things” by embedding computing devices in everyday objects? How do we benefit from this increased interconnectivity?
2) What are the risks associated with this kind of connectivity? How does the issue of cybersecurity relate to the Internet of Things?
This threat map displays data for recent cyber attack attempts. Take some time to explore where the attacks are coming from and which countries are being targeted.
To view data around a specific country, click on the country on the map.
Once you are ready to move on, click “Continue”.
Source: “Live Cyber Attack Threat Map | Check Point Software.” https://threatmap.checkpoint.com/. Accessed 31 Jan. 2018.
1) Why is it important to learn about cybersecurity?
2) What do you hope to learn from this cybersecurity unit?