Learning Resource Type

Classroom Resource

Hot Shots & Hot Jobs: Cyber Security Analysts Fight Crime

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Learn about the exciting opportunities for and vital roles played by Cyber Security Analysts in the growing field of Cyber Security. Watch this Science Matters video to learn what it means to be a Cyber Security Analyst and see if this job could be the right fit for you.

Worms. Trojan Horses. Hackers and Clouds. It is not what’s happening in the movies, but what’s happening in cyberspace- that area that connects all of us and our computers to the internet and each other. Cyber Security is important to all of us and it's a HOT JOB of the future. This video comes with discussion questions. 

    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.22

    Research the impact of computing technology on possible career pathways.

    Unpacked Content

    UP:DLCS18.HS.22

    Vocabulary

    • computing technology

    Knowledge

    Students know:
    • computing technology can impact careers both positively and negatively.

    Skills

    Students are able to:
    • recognize that changes in technology will affect future career opportunities (examples: taxi cabs vs. ride sharing; self-driving vehicles vs. over
    • the
    • road trucking; change in space needed at colleges as students transition to online courses).

    Understanding

    Students understand that:
    • being mindful of changes in technology can make one aware of potential changes in future industry.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.36

    Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

    Unpacked Content

    UP:DLCS18.HS.36

    Vocabulary

    • cybersecurity
    • two-factor authentication (TFA)
    • geolocation
    • privacy
    • cryptography

    Knowledge

    Students know:
    • how to evaluate the tradeoffs of cybersecurity recommendations.
    • how to articulate the pros and cons of TFA.
    • the importance of password requirements.
    • how to articulate the pros and cons of geolocation.

    Skills

    Students are able to:
    • explain pros and cons of cybersecurity recommendations.
    • describe the use of two-factor authentication.
    • explain the importance of password requirements.
    • describe the use of geolocation.

    Understanding

    Students understand that:
    • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
    Link to Resource

    CR Resource Type

    Audio/Video

    Resource Provider

    PBS
    Accessibility
    License

    License Type

    Custom
    ALSDE LOGO