Cybersecurity-W

CyberSecurity **LUNCH – We have A Lunch Textbook and Simulator All textbook and simulators will be online. Your only issue may be connection speed especially with the simulator. You will use a digital notebook for all notes for this course. You will be allowed to use the digital notebook on all tests EXCEPT the end…

Read More

All Classes

Have a safe and happy summer! Hopefully we’ll see you in August.

Read More

CyberSecurity-Online

Please take the E-Learning Quiz.  It is more about fun.  Please do NOT use the internet to help answer the question and do your best.  The grade will not count towards your 4th Nine Weeks Grade. Thank you making the first year of CyberSecurity fun and INTERESTING.  Best of luck moving forward in life and…

Read More

CyberSecurity-Online

Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice data hiding techniques, such as cryptography and steganography. Finally, they attempt to decrypt each other’s encrypted messages. Lesson 4.1 – Cryptography Activity 4.1.1 Ciphers and Early Cryptography Activity 4.1.2 Symmetric and Asymmetric Encryption Activity…

Read More

CyberSecurity-Online

Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice data hiding techniques, such as cryptography and steganography. Finally, they attempt to decrypt each other’s encrypted messages. Lesson 4.1 – Cryptography Activity 4.1.1 Ciphers and Early Cryptography Activity 4.1.2 Symmetric and Asymmetric Encryption Activity…

Read More

CyberSecurity-Online

Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice data hiding techniques, such as cryptography and steganography. Finally, they attempt to decrypt each other’s encrypted messages. Lesson 4.1 – Cryptography Activity 4.1.1 Ciphers and Early Cryptography Activity 4.1.2 Symmetric and Asymmetric Encryption Activity…

Read More

CyberSecurity-Online

Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice data hiding techniques, such as cryptography and steganography. Finally, they attempt to decrypt each other’s encrypted messages. Lesson 4.1 – Cryptography Activity 4.1.1 Ciphers and Early Cryptography Activity 4.1.2 Symmetric and Asymmetric Encryption Activity…

Read More

CyberSecurity-Online

Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice data hiding techniques, such as cryptography and steganography. Finally, they attempt to decrypt each other’s encrypted messages. Lesson 4.1 – Cryptography Activity 4.1.1 Ciphers and Early Cryptography Activity 4.1.2 Symmetric and Asymmetric Encryption Activity…

Read More

CyberSecurity-Online

I am jumping ahead to allow students to have fun with their last unit. This section is about Cryptography. According to educators who have taught this class before, this is the most enjoyable section. Cryptography Students learn the history of encryption and ciphers and use frequency predictors to try to break the codes. They practice…

Read More

CyberSecurity-Online

Lesson 3.2 – Attacks from the Net Activity 3.3.2 Analyzing Control Messages (2 Days) Activity 3.3.3 Analyzing Packet Fragmentation (2 Days) Activity 3.3.4 Analyzing Wireless Authentication (2 Days) Project 3.3.5 Analyzing the Attack (4 Days) ASSIGNMENT (DUE TUESDAY 4/28): Project 3.3.5 Analyzing the Attack NEXT ASSIGNMENT:  (START ON THURSDAY 4/30):  Activity 4.1.1 We are going…

Read More