**Last Class to work on this Problem
Cyber Problem 1.3.1
Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2.
- Students will work individually on this problem
- Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.
Time Allowed: 3 Class Periods
PSAT Day and Early Release Day
**Last Class to work on this Problem
Cyber Problem 1.3.1
Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2.
- Students will work individually on this problem
- Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.
Time Allowed: 3 Class Periods
Cyber Problem 1.3.1
Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2.
- Students will work individually on this problem
- Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.
Time Allowed: 3 Class Periods
Cyber Problem 1.3.1
Students apply the knowledge and skills they have learned in Lessons 1.1 and 1.2.
- Students will work individually on this problem
- Make sure students have access to the PLTW Security Lab 1.3.1 – A Dangerous Situation.
Time Allowed: 3 Class Periods
TEST
**Lesson 1.2 Canvas Test Today (40 Points)
- Access Code = MALWARE (All Caps)
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class
- Activity 1.2.3 Process Management – 1 Class
- Activity 1.2.4 Securing Your Browser – 2 Classes
- Project 1.2.5 It’s a Trap! – 2 Classes
SUB TODAY – I will be in the building but I am working with IVY TECH on DUAL CREDIT for LCHS
Lesson 1.2: Security and the Internet
PROJECT 1.2.5 is DUE Today
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class (Individual Work)
- Activity 1.2.3 Process Management – 1 Class (Individual Work)
- Activity 1.2.4 Securing Your Browser – 1 Class (Individual Work)
- Project 1.2.5 It’s a Trap! – 2 Classes (Group Work)
Lesson 1.1: Introduction to CyberSecurity
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
- Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
- Activity 1.2.4 Securing Your Browser – 1 Class – INDIVIDUAL
- Project 1.2.4 It’s a Trap! – 2 Classes – GROUP
Lesson 1.1: Introduction to CyberSecurity
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
- Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
- Activity 1.2.4 Securing Your Browser – 1 Class – INDIVIDUAL
- Project 1.2.4 It’s a Trap! – 2 Classes
Lesson 1.1: Introduction to CyberSecurity
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class – INDIVIDUAL
- Activity 1.2.3 Process Management – 1 Class – INDIVIDUAL
- Activity 1.2.4 Securing Your Browser – 2 Classes
- Project 1.2.4 It’s a Trap! – 2 Classes
Lesson 1.1: Introduction to CyberSecurity
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class
- Activity 1.2.3 Process Management – 1 Class
- Activity 1.2.4 Securing Your Browser – 2 Classes
- Project 1.2.4 It’s a Trap! – 2 Classes
Lesson 1.1: Introduction to CyberSecurity
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class
- Activity 1.2.3 Process Management – 1 Class
- Activity 1.2.4 Securing Your Browser – 2 Classes
- Project 1.2.4 It’s a Trap! – 2 Classes
Lesson 1.1: Introduction to CyberSecurity
**Lesson 1.1 Canvas Test Today (38 Points)
Lesson 1.1 Digital Notebook Assignments Due
- Activity 1.1.1 – Cyber security and Code of Conduct
- Activity 1.1.2 – Password Protection and Authentication
- Activity 1.1.3 – Email and Social Media Security Risks
- Project 1.1.4 – Save the Day
Lesson 1.2: Security and the Internet
- Activity 1.2.1 Firewalls and Malware – 2 Classes (9/14 & 9/16)
- Activity 1.2.2 File Management – 1 Class
- Activity 1.2.3 Process Management – 1 Class
- Activity 1.2.4 Securing Your Browser – 2 Classes
- Project 1.2.4 It’s a Trap! – 2 Classes
CyberSecurity
Lesson 1.1 Test will be on Monday 9/14
Project 1.1.4 – Save the Day (2 Days to Complete)
- Google Doc – Complete the Computational Artifact/Security Checklist As a TEAM
- Google Doc – Complete the Code of Conduct as a TEAM with a Minimum of 10 NEW Entries
- Google Doc – Complete the Student Digital Footprint on your OWN
- Google Doc – Complete the Ethical Question on your OWN
- Google Doc – Complete the Job Research on your OWN
SUBMIT – Each student should submit their own Document for the project in Canvas. No Exceptions
CyberSecurity
Lesson 1.1 Test will be on Monday 9/14
Project 1.1.4 – Save the Day (2 Days to Complete)
- Google Doc – Complete the Computational Artifact/Security Checklist As a TEAM
- Google Doc – Complete the Code of Conduct as a TEAM with a Minimum of 10 NEW Entries
- Google Doc – Complete the Student Digital Footprint on your OWN
- Google Doc – Complete the Ethical Question on your OWN
- Google Doc – Complete the Job Research on your OWN
SUBMIT – Each student should submit their own Document for the project in Canvas. No Exceptions
CyberSecurity
**LUNCH – We have A Lunch
DAY #2 – Activity 1.1.3 – Email and Social Media Security Risks
CURRENT EVENTS: Locate a Current Event dealing with someone who lost a job or a college scholarship due to Social Media. Record Location of Article – Name of Person (If Available) – Summary of the post and why they lost their job. You may use someone you know instead of online article.
Recommendation: If possible, view six degrees of separation outside of class.
Activity 1.1.3 – Launch the PLTW Security Lab 1.1.3 and complete assignment in Canvas. Submit assignment through canvas.
CyberSecurity
**LUNCH – We have A Lunch
Activity 1.1.3 – Email and Social Media Security Risks
CURRENT EVENTS: Locate a Current Event dealing with someone who lost a job or a college scholarship due to Social Media. Record Location of Article – Name of Person (If Available) – Summary of the post and why they lost their job. You may use someone you know instead of online article.
Recommendation: If possible, view six degrees of separation outside of class.
Activity 1.1.3 – Launch the PLTW Security Lab 1.1.3 and complete assignment in Canvas. Submit assignment through canvas.
CyberSecurity
**LUNCH – We have A Lunch
Assignment:
- Setup Google Meet with your Group for Communication Purposes.
- Discuss Ethics and the importance
- Demonstrate Virtual Machine Lab
- Digital Notebook – 2 Class Periods to Complete – Day #2
- Complete Activity 1.1.2 Vocabulary
- CSN Entry
- Password Statistics
- Common Passwords
- File Extension Types
- Data Collection Table
- CSN Entry
- Screenshot
- CSN Entry
- CSN Entry
- Conclusion Entries
CyberSecurity
**LUNCH – We have A Lunch
Assignment:
- Setup Google Meet with your Group for Communication Purposes.
- Discuss Ethics and the importance
- Demonstrate Virtual Machine Lab
- Digital Notebook – 2 Class Periods to Complete – Day #1
- Complete Activity 1.1.2 Vocabulary
- CSN Entry
- Password Statistics
- Common Passwords
- File Extension Types
- Data Collection Table
- CSN Entry
- Screenshot
- CSN Entry
- CSN Entry
- Conclusion Entries
CyberSecurity
**LUNCH – We have A Lunch
Assignment:
- Setup Google Meet with your Group for Communication Purposes.
- Complete Self Assessment – Together
- Watch the Video – Separate
- Answer Questions for Video – Together
- Google Name and provide results – Separate
- Complete Definitions – Together
- Complete Digital Footprint – Separate
- Complete Student Code of Conduct – Together
- Complete Conclusion – Together
CyberSecurity
**LUNCH – We have A Lunch
Textbook and Simulator
- All textbook and simulators will be online. Your only issue may be connection speed especially with the simulator.
- You will use a digital notebook for all notes for this course. You will be allowed to use the digital notebook on all tests EXCEPT the end of course assessment. We did not take this last year due to covid-19.
- Digital Notebook pages can be found on my site (toddiwema.com (Links to an external site.)) or canvas.
- The Digital Notebook is VERY IMPORTANT as you use information from section in other sections of the course.
- Working in teams is very important in cybersecurity.
Assignments:
- Log-in to mypltw.org – CLICK on COURSES and check out your textbook (10 Minutes)
- Create a password for yourself
- Hover your name and choose MY PROFILE
- Go over how the text works.
- Create a password for yourself
- Please REVIEW the Courses Features in the Getting Started section of your textbook. (15 Minutes)
- Observe – Kaspersky Cyberthreat real-time map – LINK (Links to an external site.) (5 Minutes)
- Open a Google Document and Name the Document – Cyber Journal Entries (25 Minutes)
- Line #1 – Cyber Journal Entries
- Line #2 – Student Name
- Line #3 – Blank Line
- Line #4 – Journal Entry #1
- Include Title, Date, and Summary of the Item. Make it Interesting Please