Instructional Technology Initiative
ISTE Standards Banner
  • Cybersecurity Education

What is Cybersecurity Education?

Cybersecurity education is the process of teaching individuals and organizations how to protect themselves from cyber threats and attacks. It includes educating individuals on best practices for securing their digital assets and personal information, as well as how to identify and respond to potential cyber threats. Cybersecurity education can cover a range of topics, including safe internet browsing, email security, password management, social engineering awareness, malware detection, and incident response. It can be delivered through various methods, such as online courses, workshops, seminars, or formal classroom instruction.

The goal of cybersecurity education is to provide individuals with the knowledge and skills they need to protect themselves and their assets from cyber threats. It can help prevent data breaches, financial losses, and reputational damage caused by cyber attacks, and contribute to a safer and more secure digital world.

Grades K-2

CyberGenerating Student Passwords

Overview: The purpose of these activities is to empower students in increasing their personal security online through recognizing and creating strong and memorable passwords.

Objective: Students will recognize the type of information that is private and identify strategies for creating and protecting secure passwords.

Lesson Plan: Generating Student Passwords

Grades 3-5

Cyber.org LogoKeys to Cybersecurity

Lesson Key 1: Personal Identifiable Information

Overview: First, students will learn what a digital footprint and personally identifiable information are. Then, students will learn when it is safe to share personally identifiable information and whom they should share it with.

Objectives: Students will learn how to keep their digital footprint safe.

https://cyber.org/learning-modules/module-1/#/

Lesson Key 2: Online Safety

Overview: In this lesson, students will learn about some things to watch out for when using technology and how to best respond to those threats. Students will also learn why it is important not to post private information online.

Objectives: Students will learn about online safety.

https://cyber.org/learning-modules/module-2/#/

Lesson Key 3: Authentication

Overview: In this key, students will learn how to create strong passwords. Students will also discover why it’s important to use multiple ways to protect their devices and learn about different kinds of authentication.

Objectives: Students will learn about authentication.

https://cyber.org/learning-modules/module-3/#/

Lesson Key 4: Connected Devices

Overview: In this key, students will learn about the risks involved in opening unknown files and connecting to unknown devices. Students will also discover the benefits of keeping their apps and devices updated and backing up data regularly. Additionally, students will learn about the Internet of Things (IoT).

Objectives: Students will learn how to protect their connected devices.

https://cyber.org/learning-modules/module-4/#/

Grades 6-8

Cyber.org LogoKeys to Cybersecurity

Protecting Your Digital Footprint

Overview: Students will learn how to protect their devices and files when using interconnected systems like the Internet of Things (IoT).

Objectives: Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

https://cyber.org/learning-modules/module-5/#/

Online Threats and Vulnerabilities

Overview: In this key, students will learn to identify the characteristics of an email or text message that may be part of a phishing scam. Students will also become more aware of the different types of threats and vulnerabilities.

Objectives: Students will explore online threats and vulnerabilities.

https://cyber.org/learning-modules/module-6/#/

Defense in Depth

Overview: Students will learn how authentication and authorization methods can protect authorized users. Students will also learn various strategies that can help protect simple networks.

Objectives: Students will take an in-depth dive into online defenses.

https://cyber.org/learning-modules/module-7/#/

Protecting Connected Devices

Overview: For this key, Students will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT). Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Objectives: Students will learn how to protect their connected devices.

https://cyber.org/learning-modules/module-8/#/

Grades 9-12

Cyber.org LogoKeys to Cybersecurity

Protecting Your Digital Footprint

Overview: Students will learn how to protect their devices and files when using interconnected systems like the Internet of Things (IoT).

Objectives: Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

https://cyber.org/learning-modules/module-5/#/

Online Threats and Vulnerabilities

Overview: In this key, students will learn to identify the characteristics of an email or text message that may be part of a phishing scam. Students will also become more aware of the different types of threats and vulnerabilities.

Objectives: Students will explore online threats and vulnerabilities.

https://cyber.org/learning-modules/module-6/#/

Defense in Depth

Overview: Students will learn how authentication and authorization methods can protect authorized users. Students will also learn various strategies that can help protect simple networks.

Objectives: Students will take an in-depth dive into online defenses.

https://cyber.org/learning-modules/module-7/#/

Protecting Connected Devices

Overview: For this key, Students will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT). Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Objectives: Students will learn how to protect their connected devices.

https://cyber.org/learning-modules/module-8/#/