Hi, what do you want to do?
Curated OER
ComSec for Network+: New Threats
Students identify the different types of security threats on a system. In this technology lesson, students demonstrate ways to defend the system from such attacks. They use computer simulation to implement security procedure.
Curated OER
Hector's World - Lesson Plan - Interactive Episode - Computer Security: "Oops"
Students examine the need for strong passwords when working online. In this computer password lesson, students access an animated sequence at the given web site. They determine the need for computer passwords when working on shared...
Curated OER
Slang Quiz: Computer
In this slang quiz worksheet, students read the phrases using computer slang and select the correct meaning of the slang for the 10 exercises.
Facebook
Public Wi-Fi
Sometimes free Wi-Fi comes with a hefty price tag! Networking novices examine the components of a Wi-Fi network during a digital citizenship lesson from an extensive series. Groups work together to map out a day's worth of Internet...
Me and My Shadow
Trace My Shadow
Which creates more digital traces: surfing the Internet in a coffee shop, or using an iPhone to send a text message? The answer may surprise you! An interactive resource prompts users to choose which devices, operating systems, and...
Curated OER
BUS:PowerPoint: All About Me - Office 2003/2007
Teach the class how to put together a PowerPoint presentation using their autobiography as the content. First, have them use the outline given to put together their autobiography in storyboard fashion. Now, they have their content ready...
Curated OER
Privacy and Online Life: Protect Yourself
Help your class protect privacy, security, and their online profiles with this examination of social media, especially Facebook, and who can see what about each of us. Resource contains useful links for learners to conduct their own...
Curated OER
5.1 Basic UNIX Commands
Students are able to understand the function of an operating system. They become familiar with the UNIX file system. Students become aware of the types of file users and file access levels. They are able to use basic UNIX commands.
Curated OER
Keyboarding Technique
Students use correct keyboarding technique to improve speed and accuracy. They respond to verbal comments, such as "Be sure you are keeping your fingers on home row." They choose one technique component to work on and fill it in on...
Massachusetts Institute of Technology
Mit: Open Course Ware: Network and Computer Security
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.
Other
Pcstats.com: Beginners Guides: Home Networking and File Sharing
This site contains information about establishing and maintaining a secure home computer network, with an emphasis on Windows-based operation systems.
Goodwill
Gcf Global: Internet Safety: Wi Fi Security
Learn tips and information about securing wireless internet networks.
Get Safe Online
Get Safe Online: Wireless Networks and Hotspots
Wireless networks are more convenient than wired networks, but wireless networks are susceptible to a wider range of security threats. This resource describes some of these security threats and how to configure a secure wireless network.
Science Buddies
Science Buddies: Point of a Parabola: Focusing Signals for a Better Wireless Net
Here's a project with practical applications for homes with a wireless network. This project shows you how to build and test parabolic reflectors for the transmitters on your network. You may be able to increase the range of your...
Get Safe Online
Get Safe Online: Use a Firewall
Firewall software forms the first line of defense against hackers and certain types of computer viruses. This site explains what a firewall can do to help secure a computer and what it cannot do. The site also discusses different types...
University of North Carolina
University of North Carolina: Pixel Flow Code Cracking
This article reveals some techniques and vulnerabilities in Unix-based computer networks.
Massachusetts Institute of Technology
Mit: Open Course Ware: Principles of Computer System Design: An Introduction
This site makes available the second part of a textbook on computer system design. The chapters cover topics such as fault tolerance, networking, consistency and information security.
Khan Academy
Khan Academy: Rogue Access Points
Learn about rogue access points to understand wireless internet access.