3

Created by

Juniper Paspula

TOPIC: Day of Cyber-Career Exploration

GRADES: 9-12 Grade

LESSON DURATION: 4-5 classes of 45 Mins duration

(Note: Day of Cyber (NSA Website activities) will be presented to students in batches to 10-15 students per semester throughout the year, most likely during after school club, meeting once a week)

Standards of Learning:

8.7 The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions.

8.11 The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity.

8.12 The student will explore careers related to the field of cybersecurity. [Related SOL: English 8.6]

MSCSE.11 The student will apply multiple methods of encryption to model the secure transmission of information.

SOFT SKILLS: Communication, Collaboration, Critical Thinking, Problem Solving

Skills Associated within the Beginner Cyber Challenge:

  • Terrorism (messages, malware, payloads)
  • Morse Code (encryption/decryption, alphabet recognition)
  • Geo-location Coordinates (finding locations from latitude & longitude)
  • Telephone Keypad (codes from alpha characters on phone keypad)
  • UAV (Drone) Types & Flight Characteristics
  • Simple Satellite Orbital Characteristics Computer Basics (number representations)
  • Linux Operating System (origin, basic commands)
  • Simple Programming Concepts (Python)
  • Basic Cyber Security Concepts (malware attacks)
  • Passwords & Ciphers (Base numbering systems, Shift ciphers)

Learning Outcome:

  1. (9th, 10th, 11th or 12th grade) High School  student, will be able to explore careers in cyber security when given required material and login information on NSA website.
  2. Student will experience the benefit of following a Cyber and STEM Education path way.
  3. Student will be able to generate Cyber Resume.
  4. Student will research the following careers in Cybersecurity field
  1. Capability Dev Specialist
  2. Computer Network Operator
  3. Cryptoanalyst
  4. Cyber Threat Center Director
  5. Cybersecurity Researcher
  6. Exploitation Analyst
  7. Vulnerability Analyst
  1. Students will earn a Certificate of Completion from NSA Day of Cyber website after exploring completing all the activities.

Materials:

  • Computer or laptops, or tablets; wifi connection

Activities:

Day 1: Social Media And Its Impact On Our Life

  1. Teacher begins the class discussion by asking questions about what they want be become after they graduate from high school. What career they would like to choose. Teacher will explain how cyber touches everything and impacts almost every business.
  2. Various means of communication like snapchats, instagram, facebook, whatapp, twitter, etc., why is it important, and how could these be harmful to someone-cyberbullying, posting harmful information on social media.
  3. Discussion on how the social media is impacting everyday life, current issues on hacking and identity thefts, confidentiality or privacy and the ways of protecting.
  4. what are junk mails, spam mail, viruses, etc, and how are they harmful to the computers that we use, who is responsible for these, how can we avoid and protect from these.

Video Links: https://www.youtube.com/watch?v=sdpxddDzXfE

Day 2: Exploring careers and Courses

 

Discussions will focus on why and how to protect one’s privacy.

 

  1. Additional prompts or guiding questions will be asked directing the students to think about how and who can to protect our devices from hacking.
  2. Is it hard to protect? do we have to learn skills, or get trained for protecting our devices and our privacy from hacked.
  3. Students will register with the given username and password on the following website. Each student will use their own computer, navigate through the NSA Day of Cyber journeys, select their favorite mentors, and watch/listen to the exciting videos of the various mentors telling stories.

Click <here> for Rubric for Cybersecurity Career Research.

Cybersecurity Employment Information:

https://www.youtube.com/watch?v=UMIxcGKuFdU

NSA Day of Cyber Website

https://www.nsadayofcyber.com/help.html#guide

Day 3: Mentoring and Success Stories

Students will continue to watching videos of  their favorite mentors. Guests will be invited to speak to the students to listen to their success stories and what they do if possible.

Cybersecurity Available Jobs:

https://www.youtube.com/watch?v=ripsQksLcPc

  • Speakers from Cybersecurity field will be invited for lectures and/or presentation

Day 4: Cyber Resume

This activity is conducted in the classroom and takes approximately 45 minutes. Students will meet the NSA Cyber Team, run the first Cyber Challenge, and generate their Students will create and develop Cyber Resumes

Resume Builder Link:

https://create.piktochart.com/dashboard

Day 5: Day of Cyber Certificate

Students will continuously navigate through their dashboard, as homework or as ongoing activities in the classroom. Students will explore four additional NSA Journeys and run Cyber Challenge, which will collectively take about two hours and should be completed within 2-3 weeks. Students will then be able to download their NSA Day of Cyber Certificate Completion which, along with the Cyber Resume, is a significant indication of their achievement and a tool for your ongoing use with them in the classroom.

Enrichment/Follow-up:

Games:

http://www.carnegiecyberacademy.com/funstuff.html

https://my.nps.edu/web/c3o/scenarios

http://www.pbs.org/wgbh/nova/labs/lab/cyber/

Field Trip: Field trip will be planned to ODU’s Cybersecurity department and to see the available facilities and courses available at ODU for students to pursue after high school, if permitted by school.

Rubric Builder:

https://www.rubric-maker.com/index.php

© 2018 Teach Cyber

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

License

Icon for the Creative Commons Attribution 4.0 International License

GenCyber Lesson Plans Copyright © 2018 by Juniper Paspula is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book