Category: Cybersecurity

  • MGM Attack Case Study

    The MGM Cyberattack Explained: How One Phone Call Crashed Las Vegas In September 2023, MGM Resorts—the company behind iconic Las Vegas hotels and casinos—was brought to its knees by a cyberattack that began with just one phone call. This video breaks down how hackers used social engineering to breach security, disrupt hotel operations, steal data,…

  • Makecode and Microbits

    If you have not seen the first article on Microbits start here. Microbits in K12 Article Video introduction to Makecode In this video I show some of the features of Makecode software and the features of the Microbits. 🎯 Purpose of Block Programming in K–12 EXAMPLE PROJECTS 🎲 1. Dice Simulator Project Link: DiceThis project…

  • Teaching Cyber at K12: Microbits

    When I introduce programming and logic, I like to start with block coding and then move to Python. One of the best places to start with (especially middle school and younger) is with Microbits. In this video I introduce Microbits and how to use them in the classroom. Video Introducing Microbits What is a Microbit?…

  • Cyber Threat Maps

    These cyber threat maps all demonstrate reported and live cyber threats. My favorite to use in class is the Kapersky Cyberthreat Map Norse Attack Map FireEye Threat Map Kaspersky Cyberthreat Real-Time Map Bitdefender Global Protective Network Check Point Threat Map A10 Networks Threat Map Akamai Kona Site Defender Threat Map Trend Micro Threat Map SANS…

  • Basics of the Internet

    At its most basic, the internet is a network of wires connecting computers, enabling communication through servers and IP addresses, similar to how electricity works. Highlights

  • Ports (Not ships or connections)

    The Internet Assigned Numbers Authority (IANA) maintains a list of well-known ports that are standardized for specific types of network services and communication protocols. These ports help ensure that data is properly routed to the appropriate service or application running on a computer or network device. When you reach an IP address, a port is…

  • Your Deleted Files Still Exist

    When you delete something it does not permanently go away. The short video below shows what happens.

  • USB Types

    There are several different types of USB and different types of connections. If you look at the end of a USB Type A or B cable (or the jack on the computer) you will see a color and that will let you know what speed that connection is. Speeds TYPE COLOR SPEED USB 1.1 White…

  • Hiding in Plain Sight: Steganography

    Steganography is the art and science of hiding Information in plain sight. Using Steganography information is hidden within other, seemingly innocuous data. The goal of steganography is to conceal the existence of the hidden information, making it difficult for others to detect or decode. This handout will provide a brief overview of steganography, including common…

  • Character to Binary

    Binary is a system of numerical notion that uses only the digits 1 and 0. The state of a circuit is either on (1) or off (0). In computers each letter and number is represented by a set of eight 0s and 1s. This is referred to as ASCII Code. The chart below illustrates this.…