Pro{tech}ting Your Digital Life
This is a self‑paced cybersecurity workbook series designed for individuals of all ages, helping them explore key concepts around online safety, privacy, and digital responsibility.
Connecting classrooms to careers
There are currently no featured resources.
This is a self‑paced cybersecurity workbook series designed for individuals of all ages, helping them explore key concepts around online safety, privacy, and digital responsibility.
The goal of this ETP is for students to understand what cybersecurity is, how it works, and why it matters in today’s world of increasingly connected devices. Students will also explore how their personal choices and actions impact the security of their data and devices.
Students will explore cybersecurity and the vulnerabilities equity process (VEP) to learn how the government uses information acquired for cybersecurity purposes.
Meet STEM Professionals who work in cybersecurity-related fields!
Decrypting secret messages has been around for decades. The need to decrypt different algorithms is essential in cyber warfare and the understanding of the threats that surround us on the internet daily.
Cyberattacks have been happening for a long time, so now there are experts in the field of cybersecurity to prevent cyberattacks. There are a lot more devices now (including computers, phones, tablets) that attacks can target.
People use apps everyday all over the world. Their personal data is flowing through the internet even when people are not actively using their devices. To this end, people need to learn how to protect their data.
Networks, hosts, clients, and servers are components of computer communication. Each component is vulnerable in different ways to cyberattacks that can result in personal and monetary loss. Students will demonstrate their learning through a game of Kahoot.
Are computers a sum of their parts or are they more than that? Hardware and software make up a computer and allow them to do the amazing things they can perform. Students will disassemble a computer (or other device) to view the components.
Ignited’s e-newsletter distributes useful information and resources to educators in a concise, easy to navigate format!