Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the …
Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.
Ethical Hacking is a course in our IT Cyber Security Program created …
Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum. This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking. Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath. All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.
TCP/IP Level Attacks Port Scanning DDoS Footprinting and Social Engineering Enumeration Programming for Security Professionals Operating System Vulnerabilities Embedded System Security Hacking Web Servers Hacking Wireless Networks Cryptography Protecting Networks with Security Devices
This is the recipe for workshop, where participants hack the rules of …
This is the recipe for workshop, where participants hack the rules of existing videogames in response to topical issues, and prototype new games that are vessels of alternative values and messages.
SummaryStudents will learn more about hacking and trolling in the online world. …
SummaryStudents will learn more about hacking and trolling in the online world. They will collaborate and build off others ideas and practice how to respond thoughtfully when creating discussions/posts/ comments. AccommodationsThis activity needs prior background that includes discussions about real news/fake news, what hacking truly means, and acting positive online, and digital literacy. This lesson allows for accommodations to be met through videos (close captioning) and completing commenting (recording it, using images/symbols). Articles/videos can be done together or independently. Images or symbols could be added to enhance learning (http://www.rcsthinkfromthemiddle.com/csi-color-symbol-image.html) Grade Level This lesson is for 5th grade and can be adjusted for younger or older students. Time duration Estimated time: One hour (or over 2 days). Teachers chose if they want to extend this activity. Teachers can divide students into groups & assign one article/video, allow them to decide, or do all based upon preference.Materials neededAccess to computers/tablets (earbuds/headphones) & google drive or other LMS systemPadlet link https://padlet.com/whitmanh1/fjp8ipdt8t6o--create separate padlets (copy/duplicate it) for multiple classesPrint an article or 2 in case the internet acts up, discussion questions posted at each table, examples of comments/responses that show 3 levels (target-exceeds, acceptable-meets, unacceptable- beginning/progressing) and rubric for self assessmentSchedule of Activities & decide on partner work (Table one does assignment #1, table two does #2, table three and four do #3, Table five does #4)
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.