Skip to main content
Home Pathways Resources Career Exploration Resources Cybersecurity Digital Lessons - STEMploration

Cybersecurity Digital Lessons - STEMploration

Students explore the roles of cybersecurity professionals as they learn about digital citizenship, digital threats, ciphers, digital security, and networking and communication protocols.

This module was developed to accompany the Possible Futures STEMploration unit by the Cybersecurity Education Consortium at Arizona State University with support from JFF. Each lesson below contains the Facilitator Guide resource provides the details and necessary preparation to enable users to complete the lesson. The .zip file contains the SCORM driver and content to be uploaded into a Learning Management System.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided in each lesson description.

View Modules
Lesson 0 - Cybersecurity Unit Overview
Time icon N/A
Edit icon Center for the Future of Arizona

Cybersecurity Virtual Lessons Unit Overview as well as Instructions for using SCORM files with Canvas and Blackboard and the list of external links to be whitelisted by lesson for this collection.


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 1 - Digital Life
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students are introduced to the concept of a digital life and they learn about the impact of their digital footprint. The students first define the term digital life. Then they evaluate their own digital footprint. The students learn about what makes a good digital citizen, and finally reflect on what they have learned and their responsibility in managing their digital footprint and being a good digital citizen.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:   https://rise.articulate.com/share/mFraFFge71m6-8m4vXwj2i5VJZFGr5Cx


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 2 - Cyber Threats
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students are introduced to the concepts of vulnerabilities and cyber threats. First, they form a basic definition of a vulnerability. Then, they learn the various kinds of cyber threats and their basic definitions. Lastly, the students expand those definitions by reading articles about real cyber threats and identifying the types of threats and how they have impacted different companies.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here: https://rise.articulate.com/share/a9la4pMqJhvr5PsbyhPODN5ItMHAuCjx


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 3 - Threat Prevention
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students learn ways to mitigate cyber threats. First, they work to identify threats found in various online environments. Then, they formulate rules to follow in their digital life at school and at home. The students understand why using prevention tools is significant to mitigating online threats. Finally, the students complete a checklist of things they can do at home to prevent cyber threats.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:  https://rise.articulate.com/share/ZjRJA85NnJh9d3v_vHrabj-zgzsEVLqX


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 4 - Introduction to Cybersecurity
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, the students are introduced to the topics of cybersecurity and the Internet of Things. First, the students view some videos to learn about cybersecurity and the Internet of Things. Next, they read an article about the Internet of Things and identify how it relates to cybersecurity. Then the students are introduced to different careers in cybersecurity. They find out what kinds of careers interest them by doing an activity that shows the various career paths in cybersecurity. Lastly, the students find out if cybersecurity is the right field for them by "taking a stand" to show how they feel about each question regarding cybersecurity and if it sounds like a career they would enjoy.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here: https://rise.articulate.com/share/JCBENkdc30F1ZWG45gzZCOX8Bt9qsDGt


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 5 - Physical and Digital Security
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students define physical and digital security. Then students read an article which goes further into the definition, so they can understand the difference between physical and digital security. Finally, the students learn about firewalls and apply what they have learned by creating a physical and digital security poster.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:  https://rise.articulate.com/share/CBV78Vo5G5pQoSODgTVmIdoT10w7x_xO


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 6 - Passwords
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students define passwords and passphrases. First, they evaluate what makes a strong password by identifying the differences between a good password and bad password. Then, the students define passphrases and understand why they are better to use than passwords. Finally, the students can distinguish between good and bad passwords.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:  https://rise.articulate.com/share/X4xbdEyonqCwEgTf4PqvV6OF8bKnEqbS


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 7 - Intro to Networking
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students understand the basics of networking. First, the students see what networking was like years ago and compare it to how it is today. Then, they discuss the definition of networking. Next, the students go over the components of a network and define a router and a switch. Afterwards, the students do an activity to help them visualize what a network looks like.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:  https://rise.articulate.com/share/z3ftADPTcRBquFRN7D0PkVp_bbV5bf_m


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 8 - Protocols
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students understand the importance of protocols as well as explore the different types of protocols. First, the students understand the definition of a protocol. Next, they are introduced to the different types of protocols. The students learn the similarities and differences between HTTP, HTTPS, SSL, and TLS. Similarly, they learn the similarities and differences between TCP and UDP. Finally, the students reflect on the significance of protocols and why it’s important to know the difference between them.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:  https://rise.articulate.com/share/IkLa5PeZTNt45tTZY2XFEf5fdMzhXP7E


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 9 - Intro to Encryption and Ciphers
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students learn about the history of encryption and how it relates to the real world. The lesson begins with the basics of encryption. Learners practice decoding an encrypted message using a Caesar Cipher. They discuss examples of encryption in the real world. Last, students apply their knowledge of Caesar Ciphers to an activity where they encode clues for others to decode.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here:   https://rise.articulate.com/share/gpTzTl-Yn_Uk_W8mthxIC3KQlNDMJI42


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 10 - Types of Ciphers
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students learn about two more types of encryption. First, they are introduced to the basic definition of a Book Cipher and use it to decrypt two examples. Then, they learn the basic definition of Steganography and read about how it is used.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here: https://rise.articulate.com/share/r9b2puLIMm023Un_HIkgSuVKqeh2Q9Q2


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 11 - Encryption Methods
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students learn about the methods for encrypting data. They learn about public and private encryption through methods like RSA and AES. Then, the students see how encryption protects their personal devices and social media.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here: https://rise.articulate.com/share/_Id_IIfWAsTEWw0GhQhqC-m83iUpwAqQ


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity
Lesson 12 - Ethical Hacking
Time icon 45-60 mins
Edit icon Center for the Future of Arizona

In this lesson, students learn what ethical hacking is and its importance. First, the students watch a video that shows different types of hackers. Then, they participate in an activity to learn the difference between white, black, and gray hats. Finally, the students reflect on why it’s important to know the difference between the three and why ethical hacking is important.

NOTE: If you use Google Classroom or another LMS that does not support SCORM, please access the digital lesson for the students through the link provided directly here: https://rise.articulate.com/share/Y8OaX7_AmD32P_n0JTkXUchxNkGGqBFc 


This resource is free to use, adapt, and share for non-commercial purposes with credit to Center for the Future of Arizona. Please review and follow our full Terms of Use.

Career Exploration Cybersecurity