Keys to Cybersecurity

Scroll down and find a cybersecurity activity for your grade level

Learn about staying safe online and complete the challenges

Complete all activities to earn your Keys to cybersecurity
Personally Identifiable Information (3-5)
First, you will learn what a digital footprint and personally identifiable information are. Then, you will learn when it is safe to share personally identifiable information and whom you should share it with.

Online Safety (3-5)
In this lesson, you will learn about some things to watch out for when using technology and how to best respond to those threats. You will also learn why it is important not to post private information online.

Authentication (3-5)
In this key, you will learn how to create strong passwords. You will also discover why it’s important to use multiple ways to protect your devices and learn about different kinds of authentication.

Connected Devices (3-5)
First, you will learn about the many ways information is gathered about you online and how the information you put online stays there—even if you delete it! Then, you will learn how to limit access to authorized users. Finally, you will learn about some of the risks and benefits of sharing personally identifiable information (PII).

Protecting your Digital Footprint (6-8)
First, you will learn about the many ways information is gathered about you online and how the information you put online stays there—even if you delete it! Then, you will learn how to limit access to authorized users. Finally, you will learn about some of the risks and benefits of sharing personally identifiable information (PII).

Online Threats and Vulnerabilities (6-8)
In this key, you will learn to identify the characteristics of an email or text message that may be part of a phishing scam. You will also become more aware of the different types of threats and vulnerabilities.

Defense in Depth (6-8)
You will learn how authentication and authorization methods can protect authorized users. You will also learn various strategies that can help protect simple networks.

Protecting Connected Devices (6-8)
For this key, you will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT).
You will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.
Explore our cybersecurity career profiles to learn what kind of jobs protect people from cyber criminals and cyber attacks!