ݺߣ

ݺߣShare a Scribd company logo
Workshops on cyber security for high school students
WorkshopsonCyberSecurityforHighSchoolWorkshopsonCyberSecurityforHighSchool
StudentsStudents
●
Atpresent,therearevariousprogramswhichhelpshighschoolstudentAtpresent,therearevariousprogramswhichhelpshighschoolstudent
about the cyber security, elevate college applications, and obtainabout the cyber security, elevate college applications, and obtain
experienceforlikelysummerinternships.experienceforlikelysummerinternships.
●
TechienestTechienest offers a set of free e­book lessons, hands­on which is offers a set of free e­book lessons, hands­on which is
preparedparticularlyforhighschoolstudentstolearncybersecuritypreparedparticularlyforhighschoolstudentstolearncybersecurity
andevaluativeinternetskills.andevaluativeinternetskills.
●
These lessons challenge for high schoolers to be as creative andThese lessons challenge for high schoolers to be as creative and
resourcefulashackerswithtopicslikesafewebprivacy,Internetuse,resourcefulashackerswithtopicslikesafewebprivacy,Internetuse,
dealing with cyber­bullies, network security, and online researchdealing with cyber­bullies, network security, and online research
techniques.techniques.
Continue...Continue...
●
The whole program consists various teaching materials in differentThe whole program consists various teaching materials in different
languages, back­end support for home schooling parents and highlanguages, back­end support for home schooling parents and high
schoolteachers,andphysicalbookswithadditionallessons.schoolteachers,andphysicalbookswithadditionallessons.
●
●
Now,ahackerismoreeasilyutilizedtodescribesomeonewhoexplores,Now,ahackerismoreeasilyutilizedtodescribesomeonewhoexplores,
andgetsadvantageofaweaknessinanetworkorcomputersystemandgetsadvantageofaweaknessinanetworkorcomputersystem
whichalsoknownasavulnerabilityorexploit.whichalsoknownasavulnerabilityorexploit.
●
●
Basically,hackersutilizewhichenterprisetoblockapproachtoregularBasically,hackersutilizewhichenterprisetoblockapproachtoregular
users, obtain approach to more computers in the network, andusers, obtain approach to more computers in the network, and
downloadinformation.downloadinformation.
Continue...Continue...
●
Thisdoesnotmeanthatallthehackersarebad,butthereisafullyThisdoesnotmeanthatallthehackersarebad,butthereisafully
professionalpracticewhichconstructedaroundethicalhackingthatprofessionalpracticewhichconstructedaroundethicalhackingthat
knownas“penetrationtesting”.knownas“penetrationtesting”.
●
Basically,Basically, TechinestTechinest offers two day offers two day workshop on cyberworkshop on cyber
securitysecurityforhighschoolstudentsandforbachelors.forhighschoolstudentsandforbachelors.
●
The cyber security preserves the integrity and data of computingThe cyber security preserves the integrity and data of computing
assets connecting to or belonging to a company's or institute'sassets connecting to or belonging to a company's or institute's
network.network.
●
It needs the perception of potential information threats, like asIt needs the perception of potential information threats, like as
maliciouscodeandotherviruses.maliciouscodeandotherviruses.
●
Basically, the cyber security procedures combine risk management,Basically, the cyber security procedures combine risk management,
identitymanagementandincidentmanagement.identitymanagementandincidentmanagement.
Workshops on cyber security for high school students
Workshops on cyber security for high school students
Workshops on cyber security for high school students

More Related Content

Similar to Workshops on cyber security for high school students (20)

Education App Development : Cost, Features and Example
Education App Development : Cost, Features and ExampleEducation App Development : Cost, Features and Example
Education App Development : Cost, Features and Example
Inexture Solutions
Benchmarking tool: the student digital experience
Benchmarking tool: the student digital experienceBenchmarking tool: the student digital experience
Benchmarking tool: the student digital experience
Jisc
How To Create An E-Learning App With The Latest Features And How Much It Cost...
How To Create An E-Learning App With The Latest Features And How Much It Cost...How To Create An E-Learning App With The Latest Features And How Much It Cost...
How To Create An E-Learning App With The Latest Features And How Much It Cost...
Nevina Infotech
Pptfor405other
Pptfor405otherPptfor405other
Pptfor405other
Gillian Quase
CYBER_1_statement
CYBER_1_statementCYBER_1_statement
CYBER_1_statement
Giang La
Ann_BNICH-ziguinchor
Ann_BNICH-ziguinchorAnn_BNICH-ziguinchor
Ann_BNICH-ziguinchor
BeLinda Nichols
Technology in the K-12 classroom
Technology in the K-12 classroomTechnology in the K-12 classroom
Technology in the K-12 classroom
tcomte
Tahunanui cluster walk_through (1)
Tahunanui cluster walk_through (1)Tahunanui cluster walk_through (1)
Tahunanui cluster walk_through (1)
Emma Watts
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
Emma Watts
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
Emma Watts
Project mapping of A3 learning
Project mapping  of A3 learningProject mapping  of A3 learning
Project mapping of A3 learning
Navodaya Vidyalaya Samiti
Teaching in the 21st century
Teaching in the 21st centuryTeaching in the 21st century
Teaching in the 21st century
EvaKilarm
PELeCON the KINECT Generations Project
PELeCON the KINECT Generations ProjectPELeCON the KINECT Generations Project
PELeCON the KINECT Generations Project
Jimmy Edwards
2011 eCruisers Introduction
2011 eCruisers Introduction2011 eCruisers Introduction
2011 eCruisers Introduction
Kaye Carraway
220711130049, Priyanka Mukherjee, Digital_age_skills_&_safe_surfing.
220711130049, Priyanka Mukherjee, Digital_age_skills_&_safe_surfing.220711130049, Priyanka Mukherjee, Digital_age_skills_&_safe_surfing.
220711130049, Priyanka Mukherjee, Digital_age_skills_&_safe_surfing.
Dr Aniket Sutradhar (Kalna College)
Teacher forum elementary2
Teacher forum elementary2Teacher forum elementary2
Teacher forum elementary2
K-12
Cyber security
Cyber security Cyber security
Cyber security
Harpreet Randhawa
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfoCopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
AlleneMcclendon878
Digital literacies webinar August2013
Digital literacies webinar August2013Digital literacies webinar August2013
Digital literacies webinar August2013
Helen Beetham
Ashima_Resume 2017
Ashima_Resume 2017Ashima_Resume 2017
Ashima_Resume 2017
ashimashrivastava
Education App Development : Cost, Features and Example
Education App Development : Cost, Features and ExampleEducation App Development : Cost, Features and Example
Education App Development : Cost, Features and Example
Inexture Solutions
Benchmarking tool: the student digital experience
Benchmarking tool: the student digital experienceBenchmarking tool: the student digital experience
Benchmarking tool: the student digital experience
Jisc
How To Create An E-Learning App With The Latest Features And How Much It Cost...
How To Create An E-Learning App With The Latest Features And How Much It Cost...How To Create An E-Learning App With The Latest Features And How Much It Cost...
How To Create An E-Learning App With The Latest Features And How Much It Cost...
Nevina Infotech
CYBER_1_statement
CYBER_1_statementCYBER_1_statement
CYBER_1_statement
Giang La
Technology in the K-12 classroom
Technology in the K-12 classroomTechnology in the K-12 classroom
Technology in the K-12 classroom
tcomte
Tahunanui cluster walk_through (1)
Tahunanui cluster walk_through (1)Tahunanui cluster walk_through (1)
Tahunanui cluster walk_through (1)
Emma Watts
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
Emma Watts
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
Emma Watts
Teaching in the 21st century
Teaching in the 21st centuryTeaching in the 21st century
Teaching in the 21st century
EvaKilarm
PELeCON the KINECT Generations Project
PELeCON the KINECT Generations ProjectPELeCON the KINECT Generations Project
PELeCON the KINECT Generations Project
Jimmy Edwards
2011 eCruisers Introduction
2011 eCruisers Introduction2011 eCruisers Introduction
2011 eCruisers Introduction
Kaye Carraway
Teacher forum elementary2
Teacher forum elementary2Teacher forum elementary2
Teacher forum elementary2
K-12
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfoCopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
CopyrightDaveL.EdyburnInclusiveTechnologiesToolsfo
AlleneMcclendon878
Digital literacies webinar August2013
Digital literacies webinar August2013Digital literacies webinar August2013
Digital literacies webinar August2013
Helen Beetham

Recently uploaded (20)

Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
RizaBedayo
Useful environment methods in Odoo 18 - Odoo ݺߣs
Useful environment methods in Odoo 18 - Odoo ݺߣsUseful environment methods in Odoo 18 - Odoo ݺߣs
Useful environment methods in Odoo 18 - Odoo ݺߣs
Celine George
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
History of Stoke Newington
Database population in Odoo 18 - Odoo slides
Database population in Odoo 18 - Odoo slidesDatabase population in Odoo 18 - Odoo slides
Database population in Odoo 18 - Odoo slides
Celine George
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
How to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of SaleHow to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of Sale
Celine George
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣsReordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Celine George
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
PUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health SystemsPUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health Systems
Jonathan Hallett
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir DotanThe Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
History of Stoke Newington
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
CBSE Arabic Grammar - Class 10 ppt.pptx
CBSE Arabic Grammar - Class 10   ppt.pptxCBSE Arabic Grammar - Class 10   ppt.pptx
CBSE Arabic Grammar - Class 10 ppt.pptx
suhail849886
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
RizaBedayo
Useful environment methods in Odoo 18 - Odoo ݺߣs
Useful environment methods in Odoo 18 - Odoo ݺߣsUseful environment methods in Odoo 18 - Odoo ݺߣs
Useful environment methods in Odoo 18 - Odoo ݺߣs
Celine George
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
South Hornsey: The Lost Local Authority that Merged with Stoke Newington by T...
History of Stoke Newington
Database population in Odoo 18 - Odoo slides
Database population in Odoo 18 - Odoo slidesDatabase population in Odoo 18 - Odoo slides
Database population in Odoo 18 - Odoo slides
Celine George
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
How to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of SaleHow to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of Sale
Celine George
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣsReordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Reordering Rules in Odoo 17 Inventory - Odoo ݺߣs
Celine George
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
PUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health SystemsPUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health Systems
Jonathan Hallett
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir DotanThe Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
The Battle of Belgrade Road: A WW1 Street Renaming Saga by Amir Dotan
History of Stoke Newington
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
CBSE Arabic Grammar - Class 10 ppt.pptx
CBSE Arabic Grammar - Class 10   ppt.pptxCBSE Arabic Grammar - Class 10   ppt.pptx
CBSE Arabic Grammar - Class 10 ppt.pptx
suhail849886
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1

Workshops on cyber security for high school students

  • 2. WorkshopsonCyberSecurityforHighSchoolWorkshopsonCyberSecurityforHighSchool StudentsStudents ● Atpresent,therearevariousprogramswhichhelpshighschoolstudentAtpresent,therearevariousprogramswhichhelpshighschoolstudent about the cyber security, elevate college applications, and obtainabout the cyber security, elevate college applications, and obtain experienceforlikelysummerinternships.experienceforlikelysummerinternships. ● TechienestTechienest offers a set of free e­book lessons, hands­on which is offers a set of free e­book lessons, hands­on which is preparedparticularlyforhighschoolstudentstolearncybersecuritypreparedparticularlyforhighschoolstudentstolearncybersecurity andevaluativeinternetskills.andevaluativeinternetskills. ● These lessons challenge for high schoolers to be as creative andThese lessons challenge for high schoolers to be as creative and resourcefulashackerswithtopicslikesafewebprivacy,Internetuse,resourcefulashackerswithtopicslikesafewebprivacy,Internetuse, dealing with cyber­bullies, network security, and online researchdealing with cyber­bullies, network security, and online research techniques.techniques.
  • 3. Continue...Continue... ● The whole program consists various teaching materials in differentThe whole program consists various teaching materials in different languages, back­end support for home schooling parents and highlanguages, back­end support for home schooling parents and high schoolteachers,andphysicalbookswithadditionallessons.schoolteachers,andphysicalbookswithadditionallessons. ● ● Now,ahackerismoreeasilyutilizedtodescribesomeonewhoexplores,Now,ahackerismoreeasilyutilizedtodescribesomeonewhoexplores, andgetsadvantageofaweaknessinanetworkorcomputersystemandgetsadvantageofaweaknessinanetworkorcomputersystem whichalsoknownasavulnerabilityorexploit.whichalsoknownasavulnerabilityorexploit. ● ● Basically,hackersutilizewhichenterprisetoblockapproachtoregularBasically,hackersutilizewhichenterprisetoblockapproachtoregular users, obtain approach to more computers in the network, andusers, obtain approach to more computers in the network, and downloadinformation.downloadinformation.
  • 4. Continue...Continue... ● Thisdoesnotmeanthatallthehackersarebad,butthereisafullyThisdoesnotmeanthatallthehackersarebad,butthereisafully professionalpracticewhichconstructedaroundethicalhackingthatprofessionalpracticewhichconstructedaroundethicalhackingthat knownas“penetrationtesting”.knownas“penetrationtesting”. ● Basically,Basically, TechinestTechinest offers two day offers two day workshop on cyberworkshop on cyber securitysecurityforhighschoolstudentsandforbachelors.forhighschoolstudentsandforbachelors. ● The cyber security preserves the integrity and data of computingThe cyber security preserves the integrity and data of computing assets connecting to or belonging to a company's or institute'sassets connecting to or belonging to a company's or institute's network.network. ● It needs the perception of potential information threats, like asIt needs the perception of potential information threats, like as maliciouscodeandotherviruses.maliciouscodeandotherviruses. ● Basically, the cyber security procedures combine risk management,Basically, the cyber security procedures combine risk management, identitymanagementandincidentmanagement.identitymanagementandincidentmanagement.