What do we need to do to keep ourselves safe online? How can we protect our identities and the devices we use? What are others doing online that could cause me harm? These questions and more are discussed in the Introduction to Cybersecurity course to help you lead a safer cyber existence.
The hands-on labs utilize the CYBER.ORG Range, which is a no-cost cyber range for all K-12 students and educators. This condensed course covers cybersecurity concepts introduced in Units 8 – 10 of CYBER.ORG’s Intro to Cybersecurity course.
Topic Details
Topic Skill
Beginner
Topic Eligible for PD Credit
Yes
Topic Cost
$ 0 per participant
Topic Min Participants
10
Topic Max Participants
15
Topic Duration
8
Topic Major Goal
This 8-hour course introduces educators to cybersecurity concepts to gain knowledge and confidence to teach those concepts to students.
Objective Description
- Apply best practices for secure device configuration.
- Apply threat modeling to home and personal IoT threats.
- Explore the use of cybersecurity tools for pentesting and for exploits.
- Identify organizations and tools available to assist with vulnerability assessment and mitigation.
- Identify types of network-based attacks including DoS, Spoofing, and MITM.
- Identify vulnerabilities in web applications including cookie manipulation, input validation, and command injection.
- Use the terminal for Linux commands and tools.