Please enable JavaScript to use CodeHS

NCyTE Cybersecurity Concept Lessons (Python)

Description

In this lesson, students will explore the importance of decision-making, ethical considerations in cybersecurity, and optimization strategies using real-world and computational problems. They will analyze network security threats, discuss accountability, and apply graph theory to solve the Muddy City problem.

Objective

Students will be able to:
- Discuss ethical implications of network security breaches.
- Identify stakeholders and accountability in cybersecurity incidents.
- Solve an optimization problem using the Minimal Spanning Tree algorithm.
- Apply decision-making strategies in real-world and computational scenarios.

Description

In this lesson, students will explore the OSI Model through an engaging real-world analogy that simulates data transmission over a network. Students will apply critical thinking to analyze network issues and their impact on communication. The activity encourages problem-solving by having students adjust to various network disruptions and constraints.

Objective

Students will be able to:
- Describe the seven layers of the OSI Model and their functions.
- Apply the OSI Model to real-world networking scenarios.
- Analyze the impact of network disruptions and propose solutions.

Description

This lesson introduces students to various types of network attacks, their impact on networks, and how they can be prevented. Students will engage in activities that promote critical thinking about cybersecurity threats and ethical considerations.

Objective

Students will be able to:
- Identify and describe different types of network attacks.
- Analyze the OSI model layers targeted by specific attacks.
- Evaluate the ethical and legal consequences of cyberattacks.
- Create a one-pager summarizing key information about a specific network attack.