PLTW CyberSecurity

Lesson Plans


**Last Class to work on this Problem

Cyber Problem 1.3.1

Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2. 

  • Students will work individually on this problem
  • Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.

Time Allowed:  3 Class Periods


PSAT Day and Early Release Day


**Last Class to work on this Problem

Cyber Problem 1.3.1

Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2. 

  • Students will work individually on this problem
  • Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.

Time Allowed:  3 Class Periods


Cyber Problem 1.3.1

Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2. 

  • Students will work individually on this problem
  • Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.

Time Allowed:  3 Class Periods


Cyber Problem 1.3.1

Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2. 

  • Students will work individually on this problem
  • Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.

Time Allowed:  3 Class Periods


TEST

**Lesson 1.2 Canvas Test Today (40 Points) 

  • Access Code = MALWARE (All Caps)

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class
  • Activity 1.2.3 Process Management – 1 Class
  • Activity 1.2.4 Securing Your Browser – 2 Classes
  • Project 1.2.5 It’s a Trap! – 2 Classes

SUB TODAY – I will be in the building but I am working with IVY TECH on DUAL CREDIT for LCHS

Lesson 1.2: Security and the Internet

PROJECT 1.2.5 is DUE Today

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class (Individual Work)
  • Activity 1.2.3 Process Management – 1 Class (Individual Work)
  • Activity 1.2.4 Securing Your Browser – 1 Class (Individual Work)
  • Project 1.2.5 It’s a Trap! – 2 Classes (Group Work)

Lesson 1.1: Introduction to CyberSecurity

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
  • Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
  • Activity 1.2.4 Securing Your Browser – 1 Class – INDIVIDUAL
  • Project 1.2.4 It’s a Trap! – 2 Classes – GROUP

Lesson 1.1: Introduction to CyberSecurity

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
  • Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
  • Activity 1.2.4 Securing Your Browser – 1 Class – INDIVIDUAL
  • Project 1.2.4 It’s a Trap! – 2 Classes

Lesson 1.1: Introduction to CyberSecurity

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
  • Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
  • Activity 1.2.4 Securing Your Browser – 2 Classes
  • Project 1.2.4 It’s a Trap! – 2 Classes

Lesson 1.1: Introduction to CyberSecurity

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class
  • Activity 1.2.3 Process Management – 1 Class
  • Activity 1.2.4 Securing Your Browser – 2 Classes
  • Project 1.2.4 It’s a Trap! – 2 Classes

Lesson 1.1: Introduction to CyberSecurity

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class
  • Activity 1.2.3 Process Management – 1 Class
  • Activity 1.2.4 Securing Your Browser – 2 Classes
  • Project 1.2.4 It’s a Trap! – 2 Classes

Lesson 1.1: Introduction to CyberSecurity

**Lesson 1.1 Canvas Test Today (38 Points)

Lesson 1.1 Digital Notebook Assignments Due

  • Activity 1.1.1 – Cyber security and Code of Conduct
  • Activity 1.1.2 – Password Protection and Authentication
  • Activity 1.1.3 – Email and Social Media Security Risks
  • Project 1.1.4 – Save the Day

Lesson 1.2: Security and the Internet

  • Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
  • Activity 1.2.2 File Management – 1 Class
  • Activity 1.2.3 Process Management – 1 Class
  • Activity 1.2.4 Securing Your Browser – 2 Classes
  • Project 1.2.4 It’s a Trap! – 2 Classes

CyberSecurity

Lesson 1.1 Test will be on Monday 9/14

Project 1.1.4 – Save the Day (2 Days to Complete)

  • Google Doc – Complete the Computational Artifact/Security Checklist As a TEAM
  • Google Doc – Complete the Code of Conduct as a TEAM with a Minimum of 10 NEW Entries
  • Google Doc – Complete the Student Digital Footprint on your OWN
  • Google Doc – Complete the Ethical Question on your OWN
  • Google Doc – Complete the Job Research on your OWN

SUBMIT – Each student should submit their own Document for the project in Canvas. No Exceptions


CyberSecurity

Lesson 1.1 Test will be on Monday 9/14

Project 1.1.4 – Save the Day (2 Days to Complete)

  • Google Doc – Complete the Computational Artifact/Security Checklist As a TEAM
  • Google Doc – Complete the Code of Conduct as a TEAM with a Minimum of 10 NEW Entries
  • Google Doc – Complete the Student Digital Footprint on your OWN
  • Google Doc – Complete the Ethical Question on your OWN
  • Google Doc – Complete the Job Research on your OWN

SUBMIT – Each student should submit their own Document for the project in Canvas. No Exceptions


CyberSecurity

**LUNCH – We have A Lunch

DAY #2 – Activity 1.1.3 – Email and Social Media Security Risks

CURRENT EVENTS: Locate a Current Event dealing with someone who lost a job or a college scholarship due to Social Media. Record Location of Article – Name of Person (If Available) – Summary of the post and why they lost their job. You may use someone you know instead of online article.

Recommendation: If possible, view six degrees of separation outside of class.

Activity 1.1.3 – Launch the PLTW Security Lab 1.1.3 and complete assignment in Canvas. Submit assignment through canvas.


CyberSecurity

**LUNCH – We have A Lunch

Activity 1.1.3 – Email and Social Media Security Risks

CURRENT EVENTS: Locate a Current Event dealing with someone who lost a job or a college scholarship due to Social Media. Record Location of Article – Name of Person (If Available) – Summary of the post and why they lost their job. You may use someone you know instead of online article.

Recommendation: If possible, view six degrees of separation outside of class.

Activity 1.1.3 – Launch the PLTW Security Lab 1.1.3 and complete assignment in Canvas. Submit assignment through canvas.


CyberSecurity

**LUNCH – We have A Lunch

Assignment:

  • Setup Google Meet with your Group for Communication Purposes.
  • Discuss Ethics and the importance
  • Demonstrate Virtual Machine Lab
  • Digital Notebook – 2 Class Periods to Complete – Day #2
    • Complete Activity 1.1.2 Vocabulary
    • CSN Entry
    • Password Statistics
    • Common Passwords
    • File Extension Types
    • Data Collection Table
    • CSN Entry
    • Screenshot
    • CSN Entry
    • CSN Entry
    • Conclusion Entries

CyberSecurity

**LUNCH – We have A Lunch

Assignment:

  • Setup Google Meet with your Group for Communication Purposes.
  • Discuss Ethics and the importance
  • Demonstrate Virtual Machine Lab
  • Digital Notebook – 2 Class Periods to Complete – Day #1
    • Complete Activity 1.1.2 Vocabulary
    • CSN Entry
    • Password Statistics
    • Common Passwords
    • File Extension Types
    • Data Collection Table
    • CSN Entry
    • Screenshot
    • CSN Entry
    • CSN Entry
    • Conclusion Entries

CyberSecurity

**LUNCH – We have A Lunch

Assignment:

  • Setup Google Meet with your Group for Communication Purposes.
  • Complete Self Assessment – Together
  • Watch the Video – Separate
  • Answer Questions for Video – Together
  • Google Name and provide results – Separate
  • Complete Definitions – Together
  • Complete Digital Footprint – Separate
  • Complete Student Code of Conduct – Together
  • Complete Conclusion – Together

CyberSecurity

**LUNCH – We have A Lunch

Textbook and Simulator

  • All textbook and simulators will be online. Your only issue may be connection speed especially with the simulator.
  • You will use a digital notebook for all notes for this course. You will be allowed to use the digital notebook on all tests EXCEPT the end of course assessment.  We did not take this last year due to covid-19.
  • Digital Notebook pages can be found on my site (toddiwema.com (Links to an external site.)) or canvas.
  • The Digital Notebook is VERY IMPORTANT as you use information from section in other sections of the course.
  • Working in teams is very important in cybersecurity.

Assignments:

  • Log-in to mypltw.org – CLICK on COURSES and check out your textbook (10 Minutes)
    • Create a password for yourself
      • Hover your name and choose MY PROFILE
    • Go over how the text works.
  • Please REVIEW the Courses Features in the Getting Started section of your textbook. (15 Minutes)
  • Observe – Kaspersky Cyberthreat real-time map – LINK (Links to an external site.) (5 Minutes)
  • Open a Google Document and Name the Document – Cyber Journal Entries (25 Minutes)
    • Line #1 – Cyber Journal Entries
    • Line #2 – Student Name
    • Line #3 – Blank Line
    • Line #4 – Journal Entry #1
      • Include Title, Date, and Summary of the Item. Make it Interesting Please