Intro to Cybersecurity Careers STEM Challenge (computer science project)

Rated 4 out of 5, based on 2 reviews
2 Ratings
;
Career In STEM
673 Followers
Standards
Formats Included
  • Zip
  • Internet Activities
Pages
34 pages
$6.99
$6.99
Share this resource
Report this resource to TPT
Career In STEM
673 Followers
Compatible with Digital Devices
The Teacher-Author has indicated that this resource can be used for device-based learning.
Also included in
  1. Explore STEM careers through this collection of 28 fun, self-paced Google Slides STEM Challenges! Upper middle and early high school students will explore a wide variety of digital media to explore STEM careers, create hands-on projects, and connect with additional resources to fuel their passions -
    Price $195.04Original Price $216.72Save $21.68

Description

Each day over 2,000 cyber crimes are committed - learn what it takes to become a cybersecurity specialist and stop cyber criminals in their tracks! This Intro to Cybersecurity Careers STEM Challenge is a self-guided, self-paced distance learning career exploration mini course for teens to explore careers in cybersecurity through fun, hands-on, real world activities and projects. Delivered in interactive Google Slides and PDF formats including:

1. 10 Types of cyber attacks analysis

2. Cybersecurity careers interactive online career exploration resources for cybersecurity analyst, IT specialist, digital forensic scientist, and computer hardware engineer (each with virtual job shadow YouTube video, career info sheet in English and Spanish, and hands on career exploration activity)

3. Cybersecurity connections in the real world activity, where students research and analyze a current cyber crime in the news

4. Simple quiz with answer key to check for understanding

5. Cracking the code activity where students learn about three types of ciphers and practice decoding them

6. Cybersecurity Incident Response Plan (CIRP) poster infographic (needed for the Challenge, plus as an added bonus print it out and use as a poster to decorate the walls of your classroom!)

7. Cybersecurity STEM Challenge: In this challenge students apply everything they learn, acting as a cybersecurity professional to create a Cybersecurity Incident Response Plan (CIRP). "You have been hired by a local business as a cybersecurity specialist after a slew of cyberattacks against the community. The business wants to be prepared for future attacks. Your first project is to write a Cybersecurity Incident Response Plan for the business!"

A step by step guide is provided to help students through the Challenge.

8. Project grading rubric (2 page googledoc)

9. Links to additional online resources to explore cybersecurity careers

This Challenge is provided as one cohesive Google Slides and PDF document with embedded links to corresponding online activities for easy uploading and sharing in your online classroom! All activities are designed to be completed independently using only simple materials and online resources, taking at least 3 hours for upper middle and early high school students to complete. Also great for GATE programs. A fun computer science career exploration project!

Supports NGSS MS-PS4-3 and NGSS HS-PS4-2.

More Computer Science STEM Career Exploration Resources:

Want valuable download & go resources to help you effortlessly integrate STEM career exploration? Then get a copy of my FREE Quick Start STEM Career Exploration Kit!

Total Pages
34 pages
Answer Key
Included with rubric
Teaching Duration
3 hours
Report this resource to TPT
Reported resources will be reviewed by our team. Report this resource to let us know if this resource violates TPT’s content guidelines.

Standards

to see state-specific standards (only available in the US).
NGSSHS-PS4-2
Evaluate questions about the advantages of using digital transmission and storage of information. Examples of advantages could include that digital information is stable because it can be stored reliably in computer memory, transferred easily, and copied and shared rapidly. Disadvantages could include issues of easy deletion, security, and theft.
NGSSMS-PS4-3
Integrate qualitative scientific and technical information to support the claim that digitized signals are a more reliable way to encode and transmit information than analog signals. Emphasis is on a basic understanding that waves can be used for communication purposes. Examples could include using fiber optic cable to transmit light pulses, radio wave pulses in wifi devices, and conversion of stored binary patterns to make sound or text on a computer screen. Assessment does not include binary counting. Assessment does not include the specific mechanism of any given device.

Reviews

Questions & Answers

673 Followers
TPT

TPT empowers educators to teach at their best.

More About Us

Keep in Touch!

Sign Up