- Chris White, CISO/CIO; former CISO of Interpublic Group
When you're done with your education (High School/College), acknowledge that despite your education, you're new to the industry and you really don't know anything. Be prepared for more education. Education never stops. Even I'm still learning.
Get a broad cybersecurity skillset. If you go too narrow, your skillset may get replaced by AI (Red team hacker, for example).
Simple metric for your value - how do you scale at work (or at school)?
If you make my life worse (your boss) you're a 1 and likely going to get fired.
If you make everyone's life around you worst, you're a 2
You show up and do your job and nobody complains about you, you're a 3.
If you make everyone's life around you better, you're a 4
If you make my life better (your boss), you're a 5.
Cybersecurity wise, schools are underfunded and doing the best they can with the money they have, but it's leaving them vulnerable to attacks, especially when their cybersecurity expert is also the janitor and the electrician.
The discussion reflects a cybersecurity landscape where threats evolve as quickly as defenses, and tools are only as good as the critical thinkers behind them. Whether working in education, healthcare, or enterprise, success depends on mastering the basics, distrusting convenience, and cultivating habits of inquiry, doubt, and continuous learning. Preparing students or professionals for this reality requires more than technical instruction; it necessitates mindset change, active skepticism, and a commitment to lifelong improvement.
The quote and suggestions from Chris come from a video conference to University of Arkansas, Little Rock students in a Cybersecurity Privacy Law class on July 24, 2025.
This site is a collection of Cybersecurity resources (or supplemental materials) that may prove helpful in cybersecurity classes. It is not meant to be a curriculum, but rather resources to help add interest to various topics. It is comprised predominantly of videos and articles, with occasional lessons/curriculum recommendations, podcasts, and activities. I do not claim ownership of any of the materials (unless it explicitly lists me as the creator/owner).
Below are some resources to help you get going.
Most of the resources are knowledge-based (Vocabulary, articles, videos, podcasts), and only a few practical application resources are available.
The content is ordered to some degree by topics, but within those topics there's not necessarily an order to the material.
If you find a resource you think should be added to this list, please share them with Mr. Birkel.
***There are several references to CyberStart throughout this website. Cyberstart discontinued in January 2024 (Not sure why) and the web links are no longer usable. I have not yet cleaned them up and am honestly waiting in the hopes that a company buys their company/resources and reposts them... slim chance, but eventually I'll go through and start cleaning up the pages or attempt to find alternative links.
Foundational Cybersecurity Framework (Resource for educators)
BeCyberSmart - Cybersecurity Crossword
Newsletters - Cyber Patriot's CyberSentinel
National Cryptological Foundation Resources
PDF - SANS ABC's of Cybersecurity (Vocab List)
Youtube Short - Developers vs Testers
Youtube: TED - Why Ethical Hacking is so Important in a 21st Century Economy
Youtube: TED - Why I Teach People How To Hack
Youtube: TED - You Should Learn How To Hack
Youtube: Hacking as a Way of Thinking
Video: OPB - How Do You Feel About The Design Tricks That Social Media Apps Use? (How are businesses hacking you?)
Youtube: The Hacker Mindset
Youtube: NovaLabs - The Secret Lives of Hackers
Youtube: NovaLabs - Car-Hacking
Article: FreeCodeCamp - What is Hacking? The Hacker Methodology Explained
Article: FreeCodeCamp - What are White Hat, Black Hat, and Red Hat Hackers? Different Types of Hacking Explained
Article: Norton - 15 Types of Hackers + Hacking Protection Tips for 2023
For Fun:
Podcast Episode - Darknet Diaries - Samy
Video - NOVA Labs - Cybersecurity Lab or Cybersecurity Lab (Both reference mostly the same material)
Youtube - Eye On Tech - What is Cybersecurity
Article - CyberStart - What is Cybersecurity? A Beginner's Guide
Article - Biden-Harris Administration Announces National Cyber Workforce & Education Strategy
Slides: 1.1 You are a Target / Cybercareers
Slides: 1.2 Intro to Computer Security
Article: The Journal - Education does 'Worst' job at cybersecurity
Article - CyberStart - 5 Types of Students You Wouldn't Think Would Be Into Cybersecurity, But Are
Website - Cyberseek
Assignment - Cyber Seek!
Extra Resources:
Booklet - New To Cyber Field Manual
Video - Global Ethics Solution - Cyber Ethics in a Real World
Video - Simplilearn - What is ethical hacking? Ethical Hacking in 8 minutes
Potential Resources:
TeachingSecurity - Ethics Agreement
Lockheed Martin - Cyber Kill Chain
"Outsmart Cyberthreats" - Booklet
"Outsmart Cyberthreats" - Student Workbook
Poster - You are a Target
Slides - CS Careers (general info on the different realms in Computer Science - Not cyber specific)
Poster: SANS - 20 Coolest Careers in Cybersecurity (Shown Above) + Associated Webpage
Posters & WebPages - Cyber.org Cyber Career Profiles
Video - An Introduction to Cybersecurity Careers
Video - InfoSec - Careers in Cybersecurity - New Advice from Def Con 24
Article - CyberStart - 5 Cyber Security Jobs You Didn't Know You Wanted Until Now
Website - Career Exploration - Cyberseek
Article - CyberStart - Is Ethical Hacking a Good Career?
Article - CyberStart - What is the Average Salary in Cybersecurity?
Article - CyberStart - The Top 7 Reasons You Should Pursue a Career in Cyber Security
Website - CybersecurityEducation.Org
Youtube: IT Career Questions - The Best Guide to Entry Level Cyber Security Jobs
Podcast - Darknet Diaries - Ep. 59: The Courthouse
Explore the following 3 Tools
Interactive - NICE Cybercareer Map
Interactive - NICE Career Pathway Tool
Interactive - NICE Career Pathway Roadmap
Interactive - NICE Competency Areas
... Actual Assignment Instructions Coming...
Interactive - NICE Workforce Framework
Education
A typical Computer-focused degree (CS, IT, CE, SE, etc) requires 4 years of college
Cybersecurity can be done as a 2 year degree or a combination of work experience in IT & Cybersecurity certifications.
Related/Unrelated
Known as the "World's Most Famous Hacker," Mitnick was once on the FBI's Most Wanted list for his high-profile cybercrimes. After serving time in prison, he became a security consultant and author, sharing his insights on cybersecurity.
Darknet Diaries Podcast Episode- Rachel
60 Minutes Clip - Con Artists Using AI (referenced in another section for class viewing)
CNN - Don't Use the Same Password (referenced in another section for class viewing)
Yubico - Inside the mind of an Ethical Hacker
Podcast - 8th Layer Insights - How Rachel Tobac Hacked Me
You task:
Find 2 more hackers (Ethical or otherwise)
Do a 1/2 page writeup (who are they, why are they famous, etc)
Content from your writeup must come from at least 3 different sources
Site your sources.
Youtube Short: Developer vs Tester - How does this apply to vulnerabilities in a cybersecurity/software setting?
Video - Joan the Phone music video
Article/Poster: CISA - Mobile Device Cybersecurity for Consumers
Youtube: CISA - Be Cyber Smart Playlist
Article: Embroker - Top 10 Cybersecurity Threats
Article - What is the CIA Triad?
Video - IBM Technology - What is the CIA Triad?
Video: Tom Scott - Why You Should Turn On Two Factor Authentication
Article - Cyberstart - Multi-Factor Authentication Explained
Article - Sans - MFA Explainer
Main Content:
Youtube - Parks & Recreation Ron vs. Online Privacy
Article/Video - CISA: 4 Things You Can Do to Keep Yourself Cyber Safe
TED Talk - How Clicking a Single Link can Cost Millions - How do cybercriminals exploit human vulnerabilities?
Youtube: 60-Minutes - Con Artists Using AI, Apps to target parents, grandparents for theft
Phone/Voice Spoofing from 8:05 to 11:17
"Be politely Paranoid - Check that this person is who they say they are."
Nova Labs - A Cyber Privacy Parable (From the Nova Cybersecurity Lab)
Assignment/Activity
Code.org - Big Data & Cybersecurity Dilemmas
Research
Individually
Pick 2 video resources listed in this lesson's "Additional Resources" section below.
List important points covered in the video related to cybersecurity.
With a partner
Discuss what you each got out of your videos (covering the important points you listed) - your videos might be the same, and they might be different.
Using the important points covered in the video, make a 1/2 page handout (8.5" x 5.5") that you could give to help others learn about this important information.
Handout must include at least 5 important points of safety as covered in 1 or more of the videos
Handout must include the videos you watched as references in some way (consider adding QR Codes to the flyer).
Handouts can be handmade, but must be digitally accessible (scan and upload to google drive)
Follow instructor's instructions for submission.
Additional Resources
Youtube Short - iPhone takes your picture every 5 seconds
Youtube Short - Hacker finds all images (of a person) on the internet
Video - How Much Do Social Media Algorithms Control You?
Youtube: TedX - Online Privacy: It Doesn't Exist: Privacy & What We Can Do About It (Video intentionally starts @ 2:04 - content prior contains sensitive content)
Youtube: Microsoft - Today in Technology - Protecting Private Data
Youtube: EFF - Encrypt the Web
Podcast (short) - Word Notes Cyber Threat Intelligence (CTI)
Article - NCA: Secure Your Home
Article - NCA: Securing Your Home Network
Tips - CISA: Protecting Your Digital Home Tips
Video - The Wall Street Journal - Is this the world's most connected man in the world?
Video (short): Sumsub - Scammer turned granny into criminal
Article: CBS - Uber Driver shot and killed by 81-year-old Ohio Man after both received scam calls, police say
Video - NovaLabs Cyber Codes
Article + Interactive: Perseverance's Parachute Secret Message Encoder
Interactive Website: Boise State - Cryptography WebQuest
Article - CyberStart - Morse Code
Code.org Encryption
Video: Art of the Problem Public Key Encryption
Article: Wiki - Cryptography
Article: GoodCore - 6 Types of Encryption That You Must Know About
Website: Practical Cryptography
Tool: Rumkin Ciphers & Codes
Tool: Cyber Chef
Video - Cyber Chef Intro
Use the Practical Cryptography, 101 Computing, Wikipedia, dCode, and Rumkin websites to explore the following ciphers
Substitution Ciphers
Simple Substitution
Caesar (a.k.a. Rot-N)
Rot13
Pigpen
Video - The Pigpen Cipher (animated)
Activity: Cyber.org - Encryption with the Pigpen Cipher
Baconian
Transposition Ciphers
Rail Fence
Columnar Transposition
Scytale (Check this one out on wiki)
Route
Polyalphabetic
Vigenere Cipher
Symetric Cipher
Other
Fractionated Morse
Article: Cyber,org - Enigma (Polyalphabetic Substitution cipher) - (Cyptanalysis of the Enigma Wiki)
Article: Free Code Camp - Encryption Algorithms Explained with Examples (Advanced)
Activity: Binary Name Keychain (Encoding Activity)
Video - Code.org - Encryption & Public Keys
Article+Interactive - Visual Cryptography
Article: CyberStart - Stenography Explained
Article: Wired - What is Stenography
Youtube: Studio C - Password Protection Problems
Youtube: JimmyKimmel - What is your Password?
Article: Password Cracking Speeds (May, 2020)
Article - Cyberstart - "How to Create a Strong and Secure Password"
Video - KnowBe4 - How Easy is it To Crack Your Password, With Kevin Mitnick
Article: Wired - What Is Credential Stuffing
Activity - *Cyber.org Test your Password Strength
Podcast - #CyberChats - Season 3 Episode 7/4/2024 (NMap & Password Safety - Start @ 3:39, listen to the end - about 8 minutes)
***Need to add something on Passkeys
Youtube: Computerphile - Hashing Algorithms & Security
Generator: FileFormat.Info - Hash Functions
Generator: Academo - SHA-256 Hash Generator
HacknetDiaries: Rock You (Major password breach that gave us the top passwords used)
Video: TED - In the War for Information, Will Quantum Computers Defeat Cryptographers
Has the potential to solve password cracking in moments...😱
Check out the challenges in the MRX20 Mission
When someone breaks into your house (lets say you come home to a broken window), what do you do?
Temporary Fix
Long Term Fix
Did you lose anything? (What's missing)
Are you safe? (is someone still inside?)
How do you prevent this in the future?
Article - CyberStart - What is a Cyber Attack? A Beginners Guide
Article - CyberStart - 5 Types of Hacks You Might Not Know and How to Avoid Them
Article - Broadband Search - 17 Common Online Scams (Be Aware)
Article - Top Japanese Dating App Omiai Hacked; 1.71 Million Users at Risk
Youtube Short - The Scariest USB Ever - Don't try this one!
Not all cyber incidents are by bad actors, sometimes, nature has a way with causing its own harm.
Check out CyberSquirel1.com
OSInt = Open Source Intelligence
The video outlines how JoseMonkey uses background information, Google Maps, and database queries (discussed but not really shown) to pinpoint possible locations and search people out. Knowing info about your target becomes even easier now thanks to Google's reverse image search.
Youtube: Identity Thief: How Your Digital Life Can Be Stolen"
Podcast - #CyberChat - There's No Hiding in a Digital World
Sock Puppets
Wiki - Sock Puppet
Youtube - The Cyber Mentor - Creating Sock Puppet Accounts
Youtube - The Cyber Mentor - Hacker Reacts to Influencer's Home Tour
Sans Factsheet - Social Engineering
Article - CyberStart - Social Engineering Explained
Youtube - Identity Theif: How Your Digital Life Can Be Stolen
Youtube: TED - What You Need to Know About Stalkerware
Youtube: The CISO Perspective - What is OSINT - The Tools Techniques, and Framework Explained
BE RESPONSIBLE - you'll be using OSINT to look up information about people. I highly discourage searching for educators or other people you know on a professional level. If you search for information on people you know, get their permission first. Otherwise, limit your searches to public figures.
Explore the tools here.
Pick a person/place and discover what you can learn about them with these tools.
In a document, list what you're able to find using these tools.
In a separate document, list what you learned from this experience (not specifics on the individual, but the types of information you can learn).
Do not disclose the information you learn about individuals to anyone outside of the individual without their consent.
Article - FBI.Gov - Gone Fishing
Website: Jolly Roger Telephone Co - A telephone service to waste the time of scammers or telemarketers.
Youtube: VPN Pro - What is Phishing - The 5 Types of Phishing Scams to Avoid
Youtube: Security Quotient - Phishing - A Game of Deception
Article - Delish.com - New Costco Membership Scam Targets Members' Credit Card Information
Article - CyberStart - Fishing Attacks Explained
Article - All About *ishing
Article - Whaling vs. Spear Phishing: Key Differences & Similarities
Youtube - QR-Fishing (Quishing)
Article: TunnelsUp - Difference between Spam & Phishing Emails
Article: Malware Tips - Trunkbox Delivery Scam
Podcast Episode - Hackable? - Gone Phishin'
Podcast Episode: Hacked - Paperweights - What happens when someone steals your phone...
Video (Humor) - James Veitch - This is What Happens When You Reply to Spam (Warning - Do not respond to Spam/Phishing attacks)
Develop a PSA Poster, Flyer, or Brochure that teaches people about *ishing attacks.
Pick an audience and tailor the PSA towards them (Children, Teenagers, Parents, Business owners, Business Staff, Teachers, etc.)
Pick a topic focus (Are you doing a "know the differences" poster (see example below), or are you wanting to highlight a specific attack type (ie. QR-ishing)
Provide graphics (draw your own graphics or develop them using computer/online tools like Canva, Illustrator, etc.) - Do not use/copy any graphics from the articles/resources provided.
Provide Definitions
Provide helpful/identifiable information (how to tell if it's a phishing attack, suggestions for ensuring a request from ____ is actually from them)
Provide Citations (either in the PSA or in a separate document)
Doxing:
Swatting:
Article: CNN - An Ohio Gamer Gets Prison Time Over a 'Swatting' Call That Led to a Man's Death
Article: PSC News - Swatting: A Deadly Trend
Youtube: Round Table Technology -This is How Hackers Hack You Using Simple Social Engineering - Jessica DefCon
Youtube: First Keystone Community Bank - Social Engineering Scams
Youtube: Wired - 9 Levels of Pickpocketing
Youtube: TEDx - Human Hacking: The Psychology behind Cybersecurity
Interactive - Social Engineering E-Mate (Take notes on the different tactics)
Interactive - Social Engineering Psychological Tactics E-Mate (Take notes on the different tactics)
A "Catch of the _____" (day, week, etc.) is a way to share with others the phishing attempts to watch out for. The email below was sent throughout the Salem-Keizer school district, was seen by the district's IT department, and a PSA was sent out to help staff see the scam, identify what makes it a scam, and help educate staff on ways to protect themselves and the organization from phishing attacks.
There are many locations to see/hear about phishing attacks. The CyberWire's Hacking Humans podcast usually has a "Catch of the Day" portion of their show to talk about scams that are sent into them.
Use the Clues - Did you see the bait?
Phishers sometimes use strange characters to bypass an organization's email filters
Phishers often try to imitate legitimate organizations to gain trust
The organization this email was sent to has a banner to help users identify when an email is being sent to them from outside the organization in order to help remind them to be cautious and look for potential phishing scams.
Double check that the phone number included in the email matches the one listed on the organization's page.
Questions to ask yourself with all incoming emails:
Was this email expected?
Are they trying to pressure me into acting fast?
Scare tactics - money has been withdrawn.
Short deadlines - 24 hours to request a refund
Does the email match the organization
Is it trying to get me to click on links? Check to make sure the link (not the text of the link, but the actual destination location) looks legit.
Is it trying to get me to call a phone number?
Interactive - Real Time Virus Map
Article: IBM - The History of Malware: A primer on the evolution of cyber threats
Article: EducationWeek - School Cyberattacks, Explained
Virus
Video: With Secure - Brain: Searching for the First PC Virus in Pakistan
Interesting side note: The creators of the "Brain Virus" created it to thwart people pirating their software... but they were pirating American software as well...
Worms
Article: FBI - The Morris Worm
Video (10 min): WhatTheHack - The Morris Worm (1988)
Activity: Malware Reading Comprehension Worksheet
Podcast Episode: Hackable? - False Charge
Podcast Episode: Hacked - The Malware Historian
Youtube Channel - danooct1 (videos outlining malware attacks throughout history)
Denial of Service (DoS) or Distributed Denial of Service (DDoS) is an attack on availability and targets flooding a service with illegitimate traffic.
DoS is typically a small scale attack.
DDoS is typically a large scale attack, most likely utilizing a botnet.
Article - Wall Arm - DoS Attack (Denial of Service)
Article - CloudFlare - Famous DDoS Attacks | The Largest DDoS Attacks of All Time
Article - Wiki - Man-In-The-Middle Attack
Article - StrongDM - Meddler-in-the-Middle (MITM) Attack: Definition, Examples & More
Video: SumSub - How are QR Codes Hacked?
Roblox Revive Atlantis (Cybersecurity Game)
Facility Cyber - Training Game - Explore scenarios and determine the best course of action (without over spending).
Video: Professor Messer - Security Controls
Video: Professor Messer - Physical Security Controls
Podcast - Fun & Games - Lockpicking, CTF, Simulations, and More
Podcast - Bridging the Cyber Skills Gap
What is a CyberRange?
Gun Ranges are for learning how to safely use a gun.
Cyber Ranges are for learning how to safely practice cybersecurity principles
Cybersecurity is a dangerous topic.
Intentional & Unintentional harm is possible.
A cyber range is a sandbox for learning cybersecurity, where students can make mistakes without breaking your infrastructure.
What is a CTF?
CTF stands for "Capture the Flag"
A way to test your cybersecurity skills.
2 formats
Jeopardy (Typical CTF - more newbie friendly)
Answer questions or show skills to get points/earn flags.
May need to do research
May need to load files into a VM (Virtual Machine)
Attack/Defend (More for college-level competitions)
Defend your infrastructure/services (patch holes, install firewall, update software, etc.)
Attack/Exploit the infrastructure/services of other participants
KC7 - The free cyber detective game
Marnegie Mellon - PicoCTF
PicoCTF Resources (Really good list)
CyberStart America
Article: "How I went from Zero Cybersecurity Knowledge to a Member fo the US Cyber Team By Playing CyberStart!"
More CTF's can be found by Googling "CTF's for Beginners" or "CTF's for Learning"
Article - CyberStart - Programming Explained
Article - FreeCodeCamp - The Ethical Hacking Lifecycle: Five Stages of a Penetration Test
Youtube: Tomorrow Unlocked - Penetration Tester Helps Banks by Hacking Them
Youtube: Wired - Hacker Answers Penetration Test Questions from Twitter
For Fun:
Podcast Episode: Darknet Diaries - HD (Metasploit)
Cyber.org - Linux 101 Lab (Ask teacher for access)
Cyber.org - Linux 102 Lab (Ask teacher for access)
Cyber.org - Fun with Linux Lab (Ask teacher for access)
Nova Labs - Networking Know How
Artificial Intelligence (AI) is getting more and more advanced and being used more and more in every sector. Cybersecurity has seen AI make improvements to fishing emails, author credential harvesting website, and even walk users through the process of creating computer virus then instructing them on ways they can spread the virus.
In order to understand the impact that AI has in cybersecurity, it helps to explore it through new stories as well as courses that teach you how to use and develop AI tools, or how to avoid being conned by them.
Article: ZDNet - I took this free AI course for developers in one weekend and highly recommend it - 13 free AI courses
Youtube: Why Can't Robots Check the Box that Says "I'm Not a Robot"?
TED Talks Daily: Magic & Wonder in the age of AI
Video: Eli the Tech Guy - What is a HoneyPot
Article: TunnelsUp - Getting Started Cracking Password Hashes with John the Ripper
Youtube Playlist - Professor Messer - CompTIA SY0-701 Security+ Training Course
9hr Ethical Hacking Course - https://www.freecodecamp.org/news/license-to-pentest-ethical-hacking-course-for-beginners/
15hr Penetration Testing Course - https://www.freecodecamp.org/news/full-penetration-testing-course/
Penetration Testing Full Course - https://www.freecodecamp.org/news/web-app-penetration-testing-full-course/
This course does not properly prepare students for certifications, but hopefully points you in the right direction. The following are resources to help inform you about various certifications you should look into, but they'll all require a lot of preparation and study.
Interactive: PaulJerimy.com Certificaton Map
Youtube: Mad Hat - Cybersecurity Certificate Tier List (2023)
Youtube: ISC2 - Is the CISSP Right For You?
A video CyberWire (A Cyber Security News Organization and the creators of the podcast "Hacking Humans") created with the help of some of their Cyber friends.
The modern Rogue is a Youtube channel by Brian Brushwood & Friends. Brian is a magician, commedian, Youtuber, author, lecturer, & podcaster. He specializes in scams, but focuses much of his energy in educating against them, teaching how to do them, and showing how to have fun with them.
As could be expected, much of Cybersecurity has a lot to do with scams (social engineering), and some of the material produced on his Youtube channel is really closely related to cybersecurity.
Fair warning - some of the content in The Modern Rogue and in the playlist provided is for more adult audiences and may not be appropriate to show in a K12 educational setting - but the resources here are really valuable.
Playlist: Information Tech & Security
Youtube Channel - Tomorrow Unlocked (Lots of videos on hacks, security, etc.)
Google's "Be Internet Awesome" Safety Online lessons (Probably for Younger Learners)
Common Sense Digital Citizen Curriculum
iKeepSafe Digital Literacy & Citizenship Curriculum
Digital Skills for a Global Society Curriculum
Cyber.org's Intro to Cybersecurity Curriculum (Formerly Garden State Cyber Curriculum) - Only accessible by teacher.
teachingsecurity.org lesson plans
Cyber.org Intro to Cyber Lessons (Excellent Resource!)
TeachCyber.org
CISCO Network Academy Free Courses
CISA Secure Our World Playlist
National Center for Computing Education
CyberChef - a Website for encryption and... stuff.
National Cybersecurity Teaching Academy - Training - 2-3 summers, 12-18 credit graduate teaching certificate for how to teach cybersecurity
RING curriculum
CLARK curriculum
Cyber.org curriculum
apps.cyber.org cyber range
E-Mates Cybersecurity - interactives (interactive slides for learning)
LabEx "Teams for Education" free for teachers + 30 students.
NCyTE Interactives - Useful interactive slides for learning
CHI Program @ University of Seattle (training program for new-to-cybersecurity teachers)
Parallax Curriculum w/ Microbit - Need the microbit boards to follow curriculum
OverTheWire "War Games"- CTF style challenges over ssh
UO Cybersecurity Challenge Cup Competition held in September.
HackThisSite
Cyber Aces - Paloalto activities for youth.