GenCyber: Appalachian Solutions Teacher Academy Agenda
Monday, June 13, 2022 | BSCTC Prestonsburg Campus |
---|---|
8:00 – 8:30 | Breakfast |
8:30 – 9:20 | Welcome, introductions and surveys |
9:30 – 10:30 | Campus Tour & Sphero Bots |
The teaching staff will be giving a tour of the campus, with specific emphasis on the areas dedicated to the Cybersecurity program. Ms. Berger introduces students to Spero bots. | |
10:40 – 12:00 | Introduction to Cybersecurity |
Participants will be involved with setting up a Raspberry Pi, which will be used in several session later. Tabitha Berger | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | Raspberry Pi Assembly |
Participants will be involved with setting up a Raspberry Pi, which will be used in several session later. Tabitha Berger | |
2:00 – 3:00 | Taking apart a PC |
Participants will be tearing down a PC, identifying all the parts and putting it back together with Dr. Miller | |
3:10 - 4:40 | Introduction to Lesson Plan Development |
Tuesday, June 14, 2022 | Virtual – MS Teams |
---|---|
8:30 - 9:20 | Cybersecurity First Principles I |
The Cybersecurity First Principles will be covered with examples by Dr. Miller | |
9:30 – 10:30 | Introduction to Emates and Other classroom Tools |
Introduction to the Emates, which are online activities created through NSF grants to scaffold learning in cybersecurity and other topic will be led by Dr. Miller | |
10:40 – 12:00 | Guest Speaker – Dr. Davina Pruitt-Mentle |
Dr. Mentle will be discussing the field of Cybersecurity and the opportunities for students. | |
12:00 – 1:00 | Lunch |
Cyber ethics will be covered as well as some ways of protecting online identities | |
2:00 – 3:00 | PC & OS Architecture |
Dr. Miller will cover the basic parts of the PC, what they do, and the different parts of an Operating System | |
3:10 – 4:40 | Breakout: Lesson Plan Development |
Ms. Berger will further discuss and lead participants into the first stages of their lesson plans. |
Wednesday, June 15, 2022 | BSCTC Prestonsburg Campus |
---|---|
8:00 - 8:30 | Breakfast |
8:30 - 9:20 | Introduction to Ethical Hacking |
Professor McKenzie will lead the introduction to basic hacking methods with hands-on exercises using available Internet services and case study discussion. | |
9:30 - 10:30 | Introduction to Crytography |
Professor McKenzie will lead the introduction to cryptography and cover some historical methods of encrypting data. | |
10:40 - 12:00 | Crytography Games and Exercises |
Professor McKenzie will lead the participants with engaging games and crypto exercises to scaffold understanding of the concept. | |
12:00 - 1:00 | Lunch |
1:00 – 1:50 | Wireless cracking using Wireshark |
Ms. Berger will lead the participants into installing Wireshark and using it to sniff our dedicated network to illustrate the ease at which information can be compromised. | |
2:00 - 3:00 | Raspberry Pi Continued |
Ms. Berger will continue the session on Raspberry PIs and demonstrate other uses such as a gaming station. | |
3:10 – 4:40 | Breakout: Lesson Plan Development |
Ms. Berger will illustrate some of the other uses for the Raspberry PI. |
Thursday, June 16, 2022 | Virtual – MS Teams |
---|---|
8:30 – 9:20 | Virtual Tour of NSA and Discussion |
Participants will do a virtual tour of the NSA with a discussion session to follow about the virtual tours available through the NSA information site. | |
9:30 – 10:30 | Cybersecurity Program & Careers |
Dr. Miller will discuss the career options in Cybersecurity at the college and others throughout the industry. | |
10:40 – 12:00 | Guest Speaker |
To be determined | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | Password Management & Cracking |
Professor McKenzie will lead the presentation on password size, complexity and management. She will also illustration how to do password cracking. | |
2:00 – 4:40 | Lesson Plan Development | Project Reviews | Jeopardy Game |
Friday, June 17, 2022 | BSCTC Prestonsburg Campus |
---|---|
8:00 – 8:30 | Breakfast |
8:30 – 9:20 | Email Phishing & Social Engineering – Card Game |
Professor McKenzie will lead a discussion on using the card game to engage students in email phishing and social engineering lessons. | |
9:30 – 10:30 | Escape room activity |
Participants will use the concepts learned during the week for an escape room activity. All faculty will lead this session. | |
10:40 – 12:00 | Creating an escape room activity |
Participants will build on concepts gleaned and come up with obstacles and ideas to design parts of an escape room. | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | Lesson Plan Project Presentations |
Participants will present their lesson plans with a discussion to follow | |
2:00 – 3:00 | Lesson Plan Project Presentations (continued) |
Participants will present their lesson plans with a discussion to follow | |
3:10 – 4:40 | Reflection & Awards and final survey |
Final survey, reflection over the week’s activities and students are given certificates |