Cybersecurity: Cyber Patriot- A national youth cyber education program
Course Overview:
This course will guide you through this technique for protecting information, from explaining encryption keys to exploring real-world uses of cryptography. Students / Children of the 2020’s are online more than every generation before them and this comes with a level of exposure to Phishing. Cybersecurity is an essential part of internet usage and kids today spend several hours on phones, T.V, Ipads, games consoles and more with devices all streaming on the internet. One of the most common criminal activities online is Phishing and Smishing. This class will prepare kids to sense when they are targeted by scammers pretending to be other players in video games or friends on messaging apps. Many of these attacks come in the form of prizes in exchange for personal information, links to free Games and other Malwares. Others come in the form of friendly questions which can expose personal information or parents’ information. This course teaches kids to identify these criminal requests, and be wary not to provide innocent replies, thus falling for scams.
Learning Goals:
- Student will understand the whole construct of Cybersecurity
- Students will understand the challenges and opportunities from cyberspace
- Students must understand the methods for a safe navigation on Internet and Social Media
- Learners will know the major sources of Cyber threats within electronic mail and programs
- Learners will know Cybersecurity methods and tools
- Students will know the protocols involved in reporting cybercrime incidents and actions to take
- Students will understand confidentiality as a principle and confidentiality of Data
- Students will be able to explain and determine the integrity of Data and Information
- Learners will explore data, and understand the concept of data availability
- Students will understand and apply authentication of data as a
- Students will be exposed to Data management principles and authorization
- Students will know what auditing and monitoring is, and how it works in Cybersecurity
- Non-repudiation and compliance
- Security Awareness and Training
- Class Projects and exercises
- Assessments
Teachers Expertise:
Our tutors and coaches are well vetted, and seasoned with many years of classroom experience teaching kids of different ages and backgrounds. We adopt the easiest ways and methodologies for our learners.
Class projects will bring all the learning home
Students Supply List:
Students will require a Laptop, good internet connection, headphones, pen and paper. Other resources will be provided to students in class.
Parental Guidance:
Parents should track activities and have a good discussion with student after the course. The threat on cyberspace is ever-growing and knowledge of this course is essential for everyone. To protect children’s online privacy, we limit what we collect during the signup process, and what we make public on the website. We don’t sell or rent account information to anyone. You can find out more about our Privacy Policy page