Keys to Cybersecurity

Keys to Cybersecurity

Description
Welcome to the Keys to Cybersecurity! These are self-paced, engaging activities designed to introduce students in 3rd - 8th grades to basic cybersecurity concepts. After completing each Key, students will be awarded a certificate showing mastery over the topic!
Highlighted Content
Cards
Text
Keys graphic 1

Scroll down and find a cybersecurity activity for your grade level

Text
Keys graphic 2

Learn about staying safe online and complete the challenges

Text
Keys graphic 3

Complete all activities to earn your Keys to cybersecurity

Main Content
Section Title
Explore the Elementary Keys
Items
Text
PII FT

Personally Identifiable Information (3-5)

First, you will learn what a digital footprint and personally identifiable information are. Then, you will learn when it is safe to share personally identifiable information and whom you should share it with.

Explore the Key

Text
OS FT

Online Safety (3-5)

In this lesson, you will learn about some things to watch out for when using technology and how to best respond to those threats. You will also learn why it is important not to post private information online.

Explore the Key

Text
A FT

Authentication (3-5)

In this key, you will learn how to create strong passwords. You will also discover why it’s important to use multiple ways to protect your devices and learn about different kinds of authentication.  

Explore the Key

Text
CD FT

Connected Devices (3-5)

First, you will learn about the many ways information is gathered about you online and how the information you put online stays there—even if you delete it! Then, you will learn how to limit access to authorized users. Finally, you will learn about some of the risks and benefits of sharing personally identifiable information (PII).

Explore the Key

Section Title
Explore the Middle Keys
Items
Text
PDF FT

Protecting your Digital Footprint (6-8)

First, you will learn about the many ways information is gathered about you online and how the information you put online stays there—even if you delete it! Then, you will learn how to limit access to authorized users. Finally, you will learn about some of the risks and benefits of sharing personally identifiable information (PII).

Explore the Key

Text
OTF FT

Online Threats and Vulnerabilities (6-8)

In this key, you will learn to identify the characteristics of an email or text message that may be part of a phishing scam. You will also become more aware of the different types of threats and vulnerabilities.

Explore the Key

Text
DD FT

Defense in Depth (6-8)

You will learn how authentication and authorization methods can protect authorized users. You will also learn various strategies that can help protect simple networks.

Explore the Key

Text
PCD FT

Protecting Connected Devices (6-8)

For this key, you will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT).
You will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Explore the Key

Title
Interested in Learning More?
Description

Explore our cybersecurity career profiles to learn what kind of jobs protect people from cyber criminals and cyber attacks!