Social security numbers hacked. Credit card numbers stolen. Pilfered passwords. Phony e-mails. Do you know how to protect your computer, phone, network, and personal information from being compromised? The class is designed to give you the knowledge needed to protect your digital identity and devices from increasingly sophisticated attacks and scams.
Few people understand the online risks they take every day. How secure are TikTok, Instagram, SnapChat, and Facebook? Could someone steal your information from these popular apps? What could you do if someone uses your name or takes your photo without permission? What does it mean to be catfished, ghosted, or cyberbullied over social media, and how can you be sure who you are chatting with? How safe is Zoom, and are there safeguards in virtual meetings?
Malware, spyware, adware, worms, Trojan horses, and enough cyber viruses to declare a pandemic. Do you have antivirus software installed on your devices, and is it effective? Do you use Google Drive, DropBox, OneDrive, or iCloud? Learn what cloud storage is, where your documents and pictures actually "go", and how to secure your cloud files. Discuss common fails in user passwords and how to select, save, and remember safe passwords.
Learn how to tell if an online vendor is legitimate and if its transactions are secure. Discover how to identify online scams and when it is safe- or not- to accept free apps and free downloads. Find out "where" your digital library of games, movies, ebooks, and music downloads are, if they are actually yours, and what would happen to them if the app company closed.
For most users, practical computer security poses challenges. This class is designed to help you understand the answers to these questions through a series of real-life user experiences and case studies. We will work on hands-on projects and simulations to test your knowledge and apply what you have learned. Class topics include: introduction to cyber security topics; personal cyber security in the digital world; computer security for beginners and intermediate users; internet security- how you connect and protect yourself online; mobile security for on-the-go users; and privacy over the internet.
Topics in this Series: Cyber Security for the Digital Consumer (Semester 1), Cyber Security: Ethical Hacking (Semester 2), etc. Students continuing from first semester receive priority pre-registration for second semester.
Workload: Students should expect to spend 1-2 hours per week outside of class.
Assignments: All assignments will be posted on password-protected Canvas classroom management site. There, students access assignments, upload homework, take automated quizzes and tests, track grades, and message instructor and classmates.
Assessments: Completed assignments will be assessed points. Parents can calculate a letter grade using the student's points earned divided by points available, in weighted categories that include assignments, labs, quizzes, tests, projects, and presentations. Parents may view all scoring and comments at any time through the Canvas site.
What to Bring: Students should bring a laptop with charger each week. Students should have the login and primary access to the laptop's systems and software. (i.e., the student should not be just a user with the parent primary on the laptop.) Chromebooks, tablets, and phones are not sufficient for the applications in this class.
Credit: Homeschool families may wish to count this course as a component (partial) credit in Career Exploration, Technology, or Applied Computer Science for purposes of a high school transcript.