You are on page 1of 5

Lesson Plan Cybersecurity Week 1

Name: Scottie Jarrett


A. Description of Lesson Plan
Academic Subject(s): Computer Technology/Science
Grade Level(s): High School
Standards Integrated into the Lesson Plan:
CCSS.ELA-LITERACY.W.9-10.3.A Engage and orient the reader by setting out a
problem, situation, or observation, establishing one or multiple point(s) of view, and
introducing a narrator and/or characters; create a smooth progression of experiences or
events.
CCSS.ELA-LITERACY.W.11-12.3.A Engage and orient the reader by setting out a
problem, situation, or observation and its significance, establishing one or multiple
point(s) of view, and introducing a narrator and/or characters; create a smooth
progression of experiences or events.
CSSS.ELA-LITERACY.RH.6-8.1 Cite specific textual evidence to support analysis
of primary and secondary sources.
CCSS.ELA-LITERACY.WHST.9-10.9 Draw evidence from informational texts to
support analysis, reflection, and research.
CCSS.ELA-LITERACY.WHST.11-12.9 Draw evidence from informational texts to
support analysis, reflection, and research.
National Education Technology Standard for Students NETS (S):
Creativity and innovation
1.b - Create original works as a means of personal or group expression
Communication and Collaboration:
2.a Interact, collaborate, and publish with peers, experts, or others employing a
variety of digital environments and media.
2.b Communicate information and ideas to multiple audiences using a variety of
media and formats.
Digital Citizenship:
5.a Advocate and practice safe, legal, and responsible use of information and
technology.
5.b Exhibit a positive attitude toward using technology that supports
collaboration, learning, and productivity.
Technology operations and concepts
6.a - Understand and use technology systems
Enduring Understanding: Students will engage in daily independent activities,
cooperative learning, and peer tutoring to comprehend a variety of informational texts in
print and non-print formats. The program curriculum structure consist of five one-hour
instruction modules, instructors guide, and student workbooks that will teach students
important skills in cyber safety and cybersecurity.

Learning Objectives for Lesson Plan:


1. Students will understand the sources of ethics and how they apply to our
understanding of right and wrong.
2. Students will understand the importance of ethics and acting ethically.
3. Students will understand what it takes to act ethically and how to practice ethical
behavior.
4. Student will learn how to protect themselves on the Internet using proper Web 2.0
tools.
5. Students will explore the role of cybersecurity and other STEM disciplines.
6. Students will identify career opportunities in cybersecurity that students may track
and train for future employment.
Brief Overview of Lesson: This lesson is an introductory of cyber safety and how to
protect personal devices from outside threats. This lesson emphasizes on fun, by bringing
highly trained educators, students, and technical professionals together to deliver an
engaging and collaborative curriculum through a state of the art Science, Technology,
Engineering, and Math (STEM) curriculum. During the lesson I will reinforce learning
by providing blogs, videos, and practical exercises. I will incorporate cooperative and
active learning by establishing small group discussions to generate hypotheses and test
theories.
Featured Technologies
Promethean Board
Computer
Internet
Other Necessary Materials:
Prerequisite Student Skills (Journal/Grammar & Composition Skills/
Word Study/knowledge in technology): Basic computer skills and knowledge
Procedures/Activities:
Day 1

Assign Students to groups 1,2,3,4.


Begin by introduction of cyber-security.
Open class with video of CyberPatriot VIII competition.
Students begin outline for reflective essay.
Begin Introduction to Cyber Security and submit comments to our daily blog
page.
Observe Group discussion, and have students watch the Cybersecurity 101 video
and submit your group discussion in the Group Page.
Have students Read Discussion Board and submit your answers with justification.
Check for Understanding.
Review group exercise on video.
2

Day 2
Open class with slideshow on Cyber Security Goals and Tools.
Have students submit comments to our daily blog page.
Ensure students participate in group discussion, watch the video and submit the
group discussion in the Group Page.
Have students read discussion board and submit answers in the blog.
Students should add lessons learned to reflective essay.
Day 3

Day 4

Open class with students viewing the slideshow on Online Safety.


Have students submit comments to our daily blog page.
Check students participation in group discussions.
Provide check on learning from CyberBullying video.
View group discussion in the Group Folder Page.
Students must read discussion board and submit answers.
Students should add lessons learned to reflective essay.
Open class with video on "A Cyber Privacy Parable".
Students should question, How you would defend your privacy?
Submit comments to the daily blog page.
Group discussion, watch video on "What is a CPU? - The Anatomy of a
Computer" and submit group discussion in the Group Folder.
View group discussion in the Group Folder.
Student should read discussion board and submit answers.

Day 5 Final
Provide final assessment of the lesson
Students complete final lesson quiz.
Students submit final reflection essay
Students submit a group evaluation form.
Students complete and submit the end of lesson survey at the end of the class.
Assessment:
Classwork, Observation, Essay, Quiz
Required Materials:
Student Workbooks
Pencil and Pens
Computers
Video presentation
Presentation slides on cyber safety and cyber-security
Homework assignment of vocabulary list
Student Assessment and Evaluation (How will you know whether or not your students
[all students] have met your objectives and shown growth toward meeting the standards?
3

What informal and formal techniques will you use? What type of corrections might you
need to make in instruction, and how will you know?
Discussion response
Essay
Observation
Quiz of multiple choice and True False questions
Differentiation Techniques: I will provide discussions and video images of content.
Students will demonstrate their understanding of the content by individual reflection,
group discussions, essay, and final quiz.
B. Analysis (Rationale)
Rationale for Activities
I selected several activities such as individual portfolio, peer group discussions,
videos, and essay for the students as a variety of learning tools to master the
objectives and standards. Some students learn best through individual study and
others through group activity. I selected these activities to enhance the students
experience in learning in a short subject. During my observation of discussion I will
insert questions to gauge the student learning. After establishing group activities I
can further observe students completing the group evaluation form. I can review
essays and final quiz to compare students ideas and formulate ideas for improvement.
There is value added with teaching with technology because it gives the students
vivid display of the topic. Technology also gives richness to delivery of text and
drama. My philosophy of teaching is to provide students with the best opportunity in
education to learn different.
C. Reflection

D. References and Annotated References


Beyond Cyberbully and Cyberbullied: the Third Absent, [video], Retrieved April 1, 2016,
from YouTube.com
https://www.youtube.com/watch?v=XnupJgY_24c&index=3&list=PLMCF5XoqfWgXAlfef5md5ch4isgUSXLW
Cyber Bullying Online PBS, [video], Retrieved April 1, 2016, from YouTube.com
https://www.youtube.com/watch?v=RVSAFhTjAdc
Nova Cyber Class http://www.pbs.org/wgbh/nova/labs/lab/cyber/
Nova Cyber Privacy Parable [video], Retrieved April 1, 2016, from YouTube.com
https://www.youtube.com/watch?v=H0I7jQb37bo
Nova Labs class https://www.youtube.com/watch?v=sdpxddDzXfE
The Making of a Cyber Warrior, https://www.youtube.com/watch?v=WbmTqzLHBGA

What is a CPU? - The Anatomy of a Computer, [video], Retrieved April 1, 2012, from
YouTube.com https://www.youtube.com/watch?v=Rm-HVpLh2Bg
What is Cyber Security? [video], Retrieved April 2, 2016, from YouTube.com
https://www.youtube.com/watch?v=sdpxddDzXfE

You might also like