Updating search results...

Search Resources

9 Results

View
Selected filters:
  • hacking
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/14/2021
Ethical Hacking
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum.
This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking.
Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath.
All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Provider:
Middlesex Community College
Date Added:
05/13/2019
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Paper-prototype socially responsive games with verbs
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This is the recipe for workshop, where participants hack the rules of existing videogames in response to topical issues, and prototype new games that are vessels of alternative values and messages.

Subject:
Arts and Humanities
Material Type:
Activity/Lab
Lesson Plan
Teaching/Learning Strategy
Provider:
Individual Authors
Provider Set:
Individual Authors
Author:
Matteo Menapace
Paolo Pedercini
Una Lee
Date Added:
11/27/2012
Understanding hacking/trolling and providing posts & comments
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

SummaryStudents will learn more about hacking and trolling in the online world. They will collaborate and build off others ideas and practice how to respond thoughtfully when creating discussions/posts/ comments. AccommodationsThis activity needs prior background that includes discussions about real news/fake news, what hacking truly means, and acting positive online, and digital literacy. This lesson allows for accommodations to be met through videos (close captioning) and completing commenting (recording it, using images/symbols).  Articles/videos can be done together or independently. Images or symbols could be added to enhance learning (http://www.rcsthinkfromthemiddle.com/csi-color-symbol-image.html) Grade Level This lesson is for 5th grade and can be adjusted for younger or older students. Time duration Estimated time: One hour (or over 2 days). Teachers chose if they want to extend this activity. Teachers can divide students into groups & assign one article/video, allow them to decide, or do all based upon preference.Materials neededAccess to computers/tablets (earbuds/headphones) & google drive or other LMS systemPadlet link https://padlet.com/whitmanh1/fjp8ipdt8t6o--create separate padlets (copy/duplicate it) for multiple classesPrint an article or 2 in case the internet acts up, discussion questions posted at each table, examples of comments/responses that show 3 levels (target-exceeds, acceptable-meets, unacceptable- beginning/progressing) and rubric for self assessmentSchedule of Activities & decide on partner work (Table one does assignment #1, table two does #2, table three and four do #3, Table five does #4)

Subject:
Educational Technology
Electronic Technology
Elementary Education
English Language Arts
Material Type:
Lesson Plan
Author:
Heather Whitman
Date Added:
11/19/2017