C5 Cybersecurity Concept Lessons

Share & Bookmark, Press Enter to show all options, press Tab go to next option
Print

C5 LogoThese 13 cybersecurity concept lessons, along with lesson roadmaps and a planning and pacing guide, were created to integrate cybersecurity into the AP Computer Science Principles course (AP CSP). Each distinct lesson contains a presentation, activities, and an overview document that can be used in the classroom for free. These lessons have been developed by high school instructors experienced at teaching AP CSP.

The current versions of the lessons are now hosted on the CLARK cybersecurity curriculum library, under the course "Cybersecurity Concepts for AP Cybersecurity," instead of on the NCyTE website. Faculty and instructors must register for a free CLARK account to download teaching materials.

Web-based versions of the lessons in both Python and JavaScript are available on CodeHS.com, where educators can access them with a free teacher account.

High school teachers seeking a web-based curriculum that combines AP CSP and cybersecurity should consider the one-year introductory course AP CSP: Cybersecurity, accessible on the CodeHS platform.

NSF LogoThe material in the Cybersecurity Concept Lessons is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5).

C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.

A basic lesson roadmap, a comprehensive lesson roadmap, and a planning and pacing guide can be downloaded from the "Files and Folders" section of the main Cybersecurity Concepts for AP Cybersecurity page on www.clark.center, accessible by educators signed in using free CLARK accounts.

Information Security & The CIA Triad Lesson
Personal Data Vulnerabilities Lesson
Identity, Authentication, & Authorization Lesson
Steganography Lesson
Input Validation and Conditionals Lesson
Vigenère Cipher Lesson
The Iterative Process Lesson
Caesar Cipher Lesson
Risk Lesson
Cyber Ethics Lesson
Secure Networking
Symmetric & Public Key Encryption Lesson
Data Structures Lesson