Hot Shots & Hot Jobs: Cyber Security Analysts Fight Crime

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Learn about the exciting opportunities for and vital roles played by Cyber Security Analysts in the growing field of Cyber Security. Watch this Science Matters video to learn what it means to be a Cyber Security Analyst and see if this job could be the right fit for you.

Worms. Trojan Horses. Hackers and Clouds. It is not what’s happening in the movies, but what’s happening in cyberspace- that area that connects all of us and our computers to the internet and each other. Cyber Security is important to all of us and it's a HOT JOB of the future. This video comes with discussion questions. 

Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.22

Research the impact of computing technology on possible career pathways.

UP:DLCS18.HS.22

Vocabulary

  • computing technology

Knowledge

Students know:
  • computing technology can impact careers both positively and negatively.

Skills

Students are able to:
  • recognize that changes in technology will affect future career opportunities (examples: taxi cabs vs. ride sharing; self-driving vehicles vs. over
  • the
  • road trucking; change in space needed at colleges as students transition to online courses).

Understanding

Students understand that:
  • being mindful of changes in technology can make one aware of potential changes in future industry.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

UP:DLCS18.HS.36

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

CR Resource Type

Audio/Video

Resource Provider

PBS

License Type

Custom
ALSDE LOGO