Hi, what do you want to do?
Curated OER
ComSec for Network+: New Threats
Learners identify the different types of security threats on a system. In this technology lesson, students demonstrate ways to defend the system from such attacks. They use computer simulation to implement security procedure.
Curated OER
Information Security Basics
Students explore the five steps to becoming a security expert. In this information security lesson, students complete a tutorial and problem solve case studies to identify proper online procedures and safety.
Curated OER
Information Technology
Students identify various threats to computers today. In this technology lesson, students explore various techniques to address security issues. They demonstrate what they have learned using classroom computers.
Curated OER
Japanese Internment Camps in the US During World War II
Eighth graders analyze the impact of the Japanese/American conflict during World War II on the Japanese American population and evaluate the consequences of government action regarding international conflict. Students demonstrate their...
Curated OER
A Civic Duty to Protest
Students examine the concept of religious freedom by evaluating Hong Kong's security laws. In pairs students investigate the levels of religous freedom allowed in various countries around the world and present this information to the class.
Curated OER
A New NATO?
Students read and interpret NATO's mission statement. After reading an article, they discover incidents in which NATO has deviated from their original purpose. In groups, they research the opinions of the countries of NATO. They write...
Curated OER
The Role of American Embassies
Pupils examine services provided by US embassies abroad. They determine what US ambassadors and embassies do in relation to US foreign policy and the protection of American interests.
Curated OER
Coral Reef Bleaching
High schoolers explore the structural biology of corals. Working individually, students identify how corals become bleached and which conditions produce more and less coral bleaching. High schoolers explore how this effects the...
Curated OER
Sea Turtles
Students investigate eight different species of sea turtles while being involved in classroom lecture and video presentation. The characteristics used to identify sea turtles is taught to help students identify unknown species.
Other
Symantec Corporation: Symantec Security Center
An information resource on threats to computer security, how to identify and report viruses, up-to-date articles on computer system vulnerabilities, etc.
Other
Commonwealth of Australia: How to Protect Your Business From Cyber Threats
Learn some tips and suggestions to protect computers from cyber threats.
Get Safe Online
Get Safe Online: Videos
There are many security threats today associated with internet use. This site presents some online videos that discuss security issues such as online rip-off schemes, protecting privacy, and protecting your computer from online attacks.
Get Safe Online
Get Safe Online: Windows Updates
One way to protect a computer from security threats is to keep the operating system up to date. This resource explains the benefits of updating the Windows operating system and how to run Windows update.
Other
Anti Virus Research Center
Symantec offers a chart of security threats and clear explanations of various types of security threats. Keeps a current list of viruses.
Other
Department of Homeland Security: Protect Myself From Cyber Attacks
Use these steps to help devise a solution to counter a cyber attack.
Get Safe Online
Get Safe Online: Wireless Networks and Hotspots
Wireless networks are more convenient than wired networks, but wireless networks are susceptible to a wider range of security threats. This resource describes some of these security threats and how to configure a secure wireless network.
Learn My Way
Learn My Way: Keeping Your Device Safe
In this course, you will learn how to protect your device and the information on it. You will learn how to keep your devices safe from possible threats, and how to use screen locks. You will also learn how to save a backup of the...
Goodwill
Gcf Global: Internet Safety : How to Avoid Malware
Malware is one of the most common hazards to your computer when you're online, but it's easy to avoid. Developing safe and smart browsing habits can protect you from malware and other threats, like viruses. Securing your computer and...
Other
Businessweek.com: The Privacy War of Richard Smith
This article details the computer work of Richard Smith and his mission to make consumers aware of the threat of eroding computer and technology privacy. (Feb. 14, 2000)