Cyber Club Toolkit

This group is designed to support Cyber Clubs
28 members | 17 affiliated resources

All resources in Cyber Club Toolkit

Data Ethics by Neal O'Farrell Published

(View Complete Item Description)

The online Data Ethics course is being shared by Neal O’Farrell of ethicause.com and runs for approximately 65 minutes and broken into eight easy-to-take lessons.The OC2 Ohio Cyber Club organization has created worksheets for each video. These worksheets include open ended questions that students can use for research and discussion.

Material Type: Lesson Plan

Author: John Wiseman

Starting a Cyber Club

(View Complete Item Description)

The Cyber Club Toolkit is designed to hep schools and other civic organizations create and run cyber clubs in Ohio. The toolkit will include cyber security activities, career resources and other links to help students understand how cyber security impacts everyone and that there are significant current and future employment opportunities in this field. Many of these materials will be created by Ohio educators, industry partners and government agencies and will be available for school, after school clubs and other youth organizations in Ohio.

Material Type: Activity/Lab

Author: John Wiseman

Tech Careers: Coding and Beyond - Grades 9-12 (INFOhio Career Exploration Unit) Published

(View Complete Item Description)

Welcome to INFOhio's Career Exploration Units. High school students will learn about a variety of technology careers including game development, hacktivism, and web design. These units contain multiple lessons that use INFOhio's digital resources to help students learn, practice, and master key learning standards while learning more about career options. Explore more about the world of work in the technology field.

Material Type: Lesson Plan

Author: Cathie Cooper

Crash Course Computer Science #31: Cybersecurity

(View Complete Item Description)

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability. This episode discusses these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DoS attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and , to keep your information safe.

Material Type: Interactive

Social Engineering Published

(View Complete Item Description)

This lesson is designed to teach students about social engineering threats and how to protect against them. Please see attached Social Engineering Lesson Plan document for more. Note that this activity may take longer with younger students. 

Material Type: Lesson Plan

Author: Randy Tucker

NOVA Labs Published

(View Complete Item Description)

This lesson is designed to allow students to learn about and protect against different Cyber Threats. Please see attached Resource: NOVA Labs Lesson Plan for lesson details.

Material Type: Lesson Plan

Author: Randy Tucker