Cybersecurity Basics is an introductory course for students in grades K-12. This course introduces cybersecurity topics that affect our everyday life in plain, simple language, making it accessible to all. It can be taught in any order and by any teacher.
This course is divided into 2 primary domains:
Security - explores various ways we protect data and information through people, processes, and technology; the types of attacks that must be defended against; and the concepts used to secure information, networks, and physical assets.
Digital Citizenship - explores how our actions affect the larger digital world; how ethics, laws, and policies affect our digital lives; and what it means to be an informed cyber citizen.
Students will use a real-life example to describe the concept of passwords. They will identify that some passwords are strong and others are weak. Students will also explain why a password is important.
Students will identify authentication measures that they might use at school or at home. They will also learn how authorization is used to restrict what actions a user can perform.
Students will research the various factors of multifactor authentication. Students will learn how multi-factor authentication prevents unauthorized users such as threat actors from gaining access to devices and accounts.
Students will identify the features of a strong password while recognizing the importance of password protection. Students will also create a secure password.
Students will explore physical security around their school and how to verify someone's identity.
Students will explore physical access controls that protect people, places, and things from malicious intent. Students will develop a security plan using modern security tools.
Students will explore how physical access controls and the concept of defense in depth are critical cybersecurity protections against threat actors. Students will use and develop layered security plans.
Students will explore the risks and vulnerabilities of online gaming. Students will identify potential cyber threats and create a way to inform others about cyber threats.
Students will recognize types of malware in a given real-life scenario.
Students will explore the idea that digital devices can be used in good ways and in bad ways. Students will also list examples of information that needs to be protected.
Students will explore how different choices are made when interacting with others online. Students will compare ethical and malicious decisions and the possible motivations behind them.
Students will explore avatars and how a real person is on the computer behind the character. Students will consider how to protect information when interacting with avatars because they are exchanging information with a real person. This connects to the cybersecurity concept of spoofing.
Students will explore the risks and vulnerabilities of online gaming software and their associated cyber threats.
Students will explore how malicious actions threaten network security as they analyze social engineering attacks.