Year 9
Cyber Security
Year 9
Cyber Security
Understand the structure and goals of the course.
Identify key topics and concepts that will be covered.
Recognize the importance of cyber security in today's digital world.
View the presentation here
List the various hardware involved in a computer system
List the various software involved in a computer system
Understand the different types of computer system
List input and output devices
State what a peripheral device is
Access the work sheet here and use this website to help your understanding of the terms here
Define cyber security and its fundamental principles.
Explain the significance of confidentiality, integrity, and availability.
Identify common cyber security terms and their meanings.
View the presentation with your teacher here complete the research task here
Visit Grok Learning and log in with your school account, look for the Cyber Hunt course and complete this short course.
Be a good problem solver
Understand that not everything is as simple as it seems
Visit Grok Learning and begin the Cyber Hunt course here this will help you practice your problem solving skills. Remember to Log in with the Microsoft button and your school account.
Be a good problem solver
Understand that not everything is as simple as it seems
Challenge yourself and your peers
Complete the word puzzle challenge worksheet here
Identify various types of cyber threats (e.g., malware, phishing, ransomware).
Understand the impact of these threats on individuals and organizations.
Recognize real-world examples of cyber threats.
Learn about basic cyber security practices (e.g., strong passwords, regular updates).
Understand the importance of personal responsibility in cyber security.
Identify tools and techniques for basic protection.
Visit the Nova labs website and complete the cybersecurity challenges here
Learn about basic cyber security practices (e.g., strong passwords, regular updates).
Understand the importance of personal responsibility in cyber security.
Identify tools and techniques for basic protection.
Passwords presentation here
Poster challenge details here
Students posters for the class of 2025 here
How do experts monitor their networks, and keep them secure from external threats?
Visit the Grok Learning website and complete the Monitoring & Securing Networks.
Visit the Cisco website here to learn about Firewalls.
Learn the principles of designing a secure network.
Understand the role of network architecture in security.
Identify best practices for network design.
Worksheet is here
Learn the principles of designing a secure network.
Understand the role of network architecture in security.
Identify best practices for network design.
Apply network security principles in practical scenarios.
Understand the importance of continuous monitoring and maintenance.
Identify tools and techniques for maintaining network security.
Define what a vulnerability is in the context of cyber security.
Identify common vulnerabilities in software and hardware.
Understand the methods used to exploit vulnerabilities.