In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.
Students will be able to:
In this lesson, students explore the complex world of data collection. Students learn about the types of data that companies collect and what they do with it. Students also consider the ethics of data collection by working through a scenario about location tracking in school. Lastly, students learn about privacy within the context of law.
Students will be able to:
In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
Students will be able to:
By the end of this lesson, students should have a better understanding of cyberethics, responsible internet use, and the impact of copyright and licenses on the digital world. They should also be more aware of the potential consequences of unethical online behavior.
Students will be able to:
In this lesson, students learn about the importance of personal data security and explore different forms of authentication and browser security settings. Students then consider the tradeoffs between ease of use and security when implementing different authentication methods.
Students will be able to:
In this lesson, students are introduced to the core concepts of cybersecurity, focusing on the importance of protecting information and devices in the digital world. Students will explore key vocabulary terms, security frameworks, and the potential risks associated with the Internet of Things (IoT).
Students will be able to:
In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this lesson, students will learn about different encryption techniques and their historical significance. They will discover the limitations of certain methods and the evolution of cryptography throughout history. Lastly, students will also explore the future of cryptography and its potential applications.
Students will be able to:
In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process.
Students will be able to:
In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.
Students will be able to:
Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics
Explain the difference between symmetric and asymmetric encryption
In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security. They will also discover the concept of hashing and its application in data integrity.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and installing Windows and Mac operating systems.
Students will be able to:
In this lesson, students delve deeper into the differences between the three main operating systems. They learn how operating systems store and manage files and the differences and similarities in each system’s interface.
Students will be able to:
In this lesson, students continue to compare and contrast different operating systems. Students learn how operating systems use file extensions to determine how to view different data types and how some extensions are only compatible with specific operating systems. Additionally, students learn about processors and the difference between a 32-bit processor and a 64-bit processor.
Students will be able to:
In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.
Students will be able to:
In this lesson, students learn about the different types of software licenses as well as the different methods of installing software based on the application’s architecture.
Students will be able to:
In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.
Students will be able to:
In this lesson, students will learn about browser security features and ways to configure their browsers to enhance security.
Students will be able to:
In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.
Students will be able to:
In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
Students will be able to:
In this lesson, students will explore how computers use the binary number system to store and communicate information. Through hands-on activities, they will learn how sequences of 0s and 1s represent data in a computer, understanding the fundamental concept of binary code. This foundational knowledge will enable students to grasp how computers interpret complex information and the importance of secure data encoding in cybersecurity.
Students will be able to:
In this lesson, students will learn how to convert between binary and decimal numbers, understand binary place values, and apply these concepts to encode and decode messages using ASCII.
Students will be able to:
In this lesson, students will learn how computers break down images into concrete values that can be stored. Students will learn how images are represented digitally using pixels.
Students will be able to:
In this lesson, students will explore the fundamental concepts of the internet, including its infrastructure and operation. Through videos, readings, and interactive activities, students will gain an understanding of wired and wireless networks, the role of submarine cables, and the foundational ideas behind the internet. The lesson culminates in a reflection activity where students articulate their understanding of the internet.
Students will be able to:
In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol. They will also gain insight into IP addresses, including their function, how to read them, and their role in network communication.
Students will be able to:
In this lesson, students explore how messages get from one address on the internet to another. Students explore the format for creating and reading packets, as defined by open protocols.
Students will be able to:
In this lesson, students will explore how websites function, learning about key concepts such as IP addresses, web servers, DNS, and HTTP. Through interactive activities, students will gain a deeper understanding of how data travels across the internet and the role of protocols in delivering web content.
Students will be able to:
In this lesson, students will explore the OSI (Open Systems Interconnection) Model, which is a conceptual framework used to understand how different networking protocols interact and work together. Students will learn about the seven layers of the OSI Model, the functions of each layer, and how it applies to real-world scenarios such as troubleshooting network issues.
Students will be able to:
In this lesson, students will explore the various impacts of the internet on society, including social, educational, and personal aspects. Through readings and the Compass Points thinking routine, students will articulate their thoughts and reflect on their understanding of the internet’s influence.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).
Students will be able to:
In this lesson, students will learn and explain the purposes and use of various peripheral types. They will classify the peripherals as input or output devices and explore different ways of installing them on a laptop or PC.
Students will be able to:
In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.
Students will be able to:
In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.
Students will be able to:
In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.
Students will be able to:
In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.
Students will be able to:
In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.
Students will be able to:
In this lesson, students complete a summative assessment of the module’s learning objectives.
In this lesson, students are introduced to coding with turtle graphics. Students will begin to recognize programs as sequences and groups of commands. Students will learn a few basic commands and then apply them right away by writing their first program.
Students will be able to:
In this lesson, students will be introduced to the layout of Tracy’s grid world and will learn how to use coordinate pairs to locate Tracy on the coordinate plane. They will add to the list of commands they know and can use to create Tracy graphics.
Students will be able to:
penup()
, pendown()
, and backward()
commands in their programsIn this lesson, students will learn how to use the left and right commands in order to move Tracy to more locations on the canvas. They will now have many commands that can be used to have Tracy create more complex graphics.
Students will be able to:
In this lesson, students are introduced to for loops. They learn how for loops simplify the process of making small changes to a program and help avoid repeating code. For loops are written like this:
for i in range (4):
// Code to be repeated 4 times
Students will be able to:
In this lesson, students are introduced to the ability to turn Tracy at any angle. With this feature, Tracy can now draw diagonal lines which opens up the possibility to draw multiple shapes that weren’t previously available.
Students will be able to:
In this lesson, students are introduced to functions. They start with the basics of defining a function and why we need them and will revisit a program they coded earlier in the unit to rewrite it using functions.
Students will be able to:
In this lesson, students are able to add some flair to their turtle graphics programs by controlling color, pensize, and fill. These new commands are added to the list of commands that have been already practiced in order to allow for more creativity in student programs.
Students will be able to:
circle()
command to draw different shapescolor()
, pensize()
, begin_fill()
, and end_fill()
commands to add more creativity to their programsIn this lesson, students are introduced to the concept of Top Down Design. Top Down Design is the process of breaking down a program into functions or smaller parts to avoid repeated code and to make our programs more readable.
Students will be able to:
In this lesson, students will learn about abstraction. Abstraction is the act of managing complexity by dissociating information and details in order to focus on relevant concepts.
Students will be able to:
In this lesson, students will learn about a fundamental aspect of every programming language: Variables. A variable is something that stores information in a program that can be used later.
Students will be able to:
In this lesson, students will learn how to incorporate user input into their programs. Students will learn how to request user input as both strings and integers, where the input is stored, and how to convert strings and integers.
Students will be able to:
In this lesson, students will dive deeper into the concept of functions by exploring how to use parameters to customize their code.
Students will be able to:
In this lesson, students will learn how to use If Statements which will allow them to use conditions to determine how their code should run.
Students will be able to:
In this lesson, students will learn how to expand on If Statements by including a way to have Tracy make decisions between multiple scenarios.
Students will be able to:
In this lesson, students will learn that while loops allow code to be executed repeatedly based on a condition. They will also be warned that infinite loops are created if the exit condition of the while loop is never met, causing the code inside the while loop to repeat continuously which causes the program to crash.
Students will be able to:
In this lesson, students review content with a 25 question End-of-Unit Quiz.
Students will be able to: