ATE Central

Browse Resources

The ATE Central resource collection and archive contain curriculum, professional development materials, videos and other valuable resources created and collected by the ATE community. Browse the resource collection using the categories listed below, or search for ATE resources via the box at upper right.

Key Concept is a subject taxonomy that Internet Scout has developed to support the ATE Central collection. The terms are the specific, fundamental bits that make up more complex knowledge in a given field, designed to help educators local materials that convey these key concepts to students in the classroom.

Refined By: Computer science -- Security and privacy

Gordon and Mike's ICT Podcast: Anonymous, Barr, Stuxnet and Soliciting Hackers

Gordon and Mike's ICT Podcast offers perspectives on the information and communication technologies (ICT) industries from Gordon Snyder and Mike Qaissaunee. In this podcast, Gordon and Mike are joined by Sam Browne from City College of San Francisco. The trio discuss the case of a man who tracked down Anonymous. The podcast also discusses other security and hacking-related topics. Running time for...

https://gsnyder.libsyn.com/anonymous-barr-stuxnet-and-solici...
Cybersafety, Cyberethics and Cybersecurity (C3) for Educators: Ethical and Legal Implications for Classroom Technology

From the University of Maryland, this page presents materials from the course Cybersafety, Cyberethics and Cybersecurity (C3) for Educators: Ethical and Legal Implications for Classroom Technology. Taught by Davina Pruitt-Mentle for graduate and undergraduate students alike, this course "addresses several of the major ethical and policy issues that are changing the way educators think about new...

http://www.edtechpolicy.org/CourseInfo/educ473.html
An Evaluation of Privacy and Security Issues at a Small University

This paper, from Michael Jones of North Carolina Agricultural and Technical State University, covers privacy and security issues at a small university. The paper identifies security and privacy strategies already in place, explores how these are dealt with in different departments procedures, conducts a security risk assessment, and discusses training procedures for faculty and staff. 

http://tiij.org/issues/issues/winter09/Winter09/jones.pdf
Careers in Information and Security Technologies

This interactive activity produced for Teachers' Domain investigates three possible career paths in information and security technologies: administration, development, and integration. Explore each path to learn more about the education and experience required for particular jobs such as computer support specialist, network and systems administrator, computer security specialist, database...

https://wisconsin.pbslearningmedia.org/resource/ate10.sci.en...
Cybercamp Lab Book

This lab manual developed by Whatcom Community College provides activities for a high school cybersecurity camp. The 101-page manual contains instructions for nine labs arranged into five sessions. Lab activities include: install Ubuntu 10.10 in VMware, set up a simple network, investigate Linux terminal commands and file structure, secure a vulnerable machine, and investigate secure we...

http://www.whatcom.edu/home/showdocument?id=714
Center for Systems Security and Information Assurance (CSSIA): Learning Resources

The Center for Systems Security and Information Assurance (CSSIA) provides this page of learning resources useful for information technology courses. Most of these materials fall under the category of course outlines and syllabi. Topics include cyber ethics, forensic accounting, disaster recovery, security awareness, wireless security, VOIP security and other pertinent subjects to this field....

https://www.cssia.org/cssiaresources/
Cybercamp Competition Day

This lab manual developed by Whatcom Community College provides activities for a competition at the end of a high school cybersecurity camp. The 19 page manual contains instructions on the required tools as well as the competition schedule, overview, and rules. Each team will be "provided with a complete unsecured network" and try to secure the network and protect it from the penetration testers.

https://www.whatcom.edu/home/showdocument?id=712
Cyberdefense Competition Introduction

This introduction developed by Whatcom Community College explains how a competition at the end of a high school cybersecurity camp worked. The goal for the attending students was to "apply the knowledge they have gained throughout the camp while trying to run a business network." The camp attendees attempted to defend networks against community college students while the director of the camp, camp...

http://www.whatcom.edu/home/showdocument?id=706
Cybercamp Project Summary

This page explains the purpose of a cybersecurity camp developed by Whatcom Community College, meant to increase awareness and interest in information security among high school students. Additionally, the "project will increase the depth of understanding and skill level among students potentially preparing for information security jobs." Females and underrepresented populations will be especially...

http://www.whatcom.edu/home/showdocument?id=708
Cyberthreat Real-time Map

This three dimensional world map, from Kaspersky Lab, shows threats to cyber security in real time. Separate colors indicate detection categories, including web anti-virus and intrusion detection scans, and each nation can be selected to view overall threat statistics and rankings. The map can be viewed either flat or as a globe, and live detection statistics run totals at the bottom of the page.

https://cybermap.kaspersky.com/
← Previous Next →