KS3 Metadata & Online Security (2/5)Quick View
Computerist

KS3 Metadata & Online Security (2/5)

(1)
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>In this second lesson, students are introduced to the concept of metadata in the context of online communications, and explore the implications of metadata sharing and leakage. The final activity in the lesson gets the students to start thinking about the concept of a threat model and the ways to design one for each person’s specific requirements.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
KS3 Intro to Cyber Security & Privacy (1/5)Quick View
Computerist

KS3 Intro to Cyber Security & Privacy (1/5)

(1)
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>In this first lesson, students are introduced to privacy and security with some independent research and debate tasks, and then they explore password security and the privacy of different messaging apps.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
KS3 Encryption (4/5)Quick View
Computerist

KS3 Encryption (4/5)

(0)
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>In this fourth lesson, students have the chance to complete their threat model and discuss their process of thought and decisions they took in creating it. They then explore some basic methods of encrypting data.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
KS3 Biometrics and other security issues (5/5)Quick View
Computerist

KS3 Biometrics and other security issues (5/5)

(0)
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>In the last lesson of this series, students investigate how biometrics and two-factor authentication can help keep devices secure (or not!), and then proceed to discuss an airport data security scenario.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
KS3 Cyber Security & PrivacyQuick View
Computerist

KS3 Cyber Security & Privacy

5 Resources
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
GCSE - Variables recap , data types, programming constructsQuick View
Computerist

GCSE - Variables recap , data types, programming constructs

(0)
<p>This lesson follows on from the Intro to Variables lesson.<br /> Students revise variables and programming constructs through Q&amp;A. They then go on to learn more about data types and practice through a pseudocode activity, suitably differentiated.<br /> The PPT includes extensive notes which are helpful to non-specialist teachers, and timings on each slide. Also included are a starter activity to get students settled as they come in, and clear Learning Objectives.</p>
KS3 Threat Models and knowledge check (3/5)Quick View
Computerist

KS3 Threat Models and knowledge check (3/5)

(0)
<p>Part of a sequence of 5 lessons aimed primarily at KS3 but also adaptable to KS4 on Cyber Security and Online Privacy.</p> <p>In this third lesson, students complete a short quiz and then continue on from the previous lesson to create their own threat model.</p> <p>The lessons offer up-to-date knowledge on how to keep oneself secure and private online, with activities ranging from password security checks to the students designing their own threat model.<br /> Most of the activities require computers or iPads with internet access as they require use of websites or online research.<br /> The lessons are designed both to impart current knowledge and to make students think about their own privacy and security practices based on their own preferences and routines.</p>
GCSE - Variables and programming constructsQuick View
Computerist

GCSE - Variables and programming constructs

(0)
<p>This lesson follows on from the Intro to Computational Thinking. After an intro to variables we look into programming constructs: sequence, selection and iteration, through various activities primarily with pseudocode. Higher ability students can code the activities on a programming language of their choice directly.<br /> The PPT includes extensive notes which are helpful to non-specialist teachers, and timings on each slide. There are also a short starter activity and clear Learning Objectives.<br /> Optional additional slides are included for Plickers and Socrative plenaries, in case you would like to use either of them.</p>
GCSE - Intro to Computational Thinking (Sandwich Robot)Quick View
Computerist

GCSE - Intro to Computational Thinking (Sandwich Robot)

(0)
<p>Introductory lesson to Computational Thinking, sequences of instructions and variables, through the ‘Sandwich Robot’ activity.<br /> Lesson PPT includes full teacher instructions on how to perform the Sandwich Robot, Q&amp;A and explanation of key concepts.<br /> The PPT includes extensive notes which are helpful to non-specialist teachers, and timings on each slide. There are also a short starter activity and clear Learning Objectives.</p>