|Title||Logo||Publisher||Type of Resource||Focus Area||Grade Band||Standards Align||Equipment Necessary||Student Learning Cost||Outcomes||Professional Learning Cost||Description||Website Link
||Additional Info||Experience Level Needed (For Teachers)||Curriculum - Integration into Core Curriculum||Certification Track||Delivery Model||Recommendations from Schools|
|Filter||Filter||Filter||Filter (Yes, No)|
|AFA National CyberPatriot||https://www.uscyberpatriot.org/SiteCollectionImages/Program%20Logos/CYBERPATRIOT_Education%20Program_black.png||AFA CyberPatriot||Competition||Cybersecurity||6-8, 9-10, 11-12||Yes and NICE Workforce Framework: see www.badgr.com||PC Windows or Mac (Competition only on PC 64 bit with enough disc space for VmWare)||$205 High School Team, $165 Middle School Team||Increase knowledge of Cybersec as an Education and Career Pathway, 89% increase in pursuit of a 2yr or 4yr degree with 74% of those student going into a STEM field,alumni of the CyberPatroit program in college 84% are in STEM fields, 85% of students going into STEM stated that being in CyberPatriot was the reason they chose those field, all these stats come from the 2020 CP Annual Reprot done by National Center for Education Statistics. (2020, April). Immediate College Enrollment Rates. Retrieved from|
https://nces.ed.gov/programs/coe/indicator_cpa.asp Other outcomes: basic computer security principles, Microsoft OS security, Linux OS security, CISCO networking security, promotes leadership, promotes working in teams on difficult security issues, promotes ethical practices in defense of our nation's infrastructure, promotes diversity and inclusion, our Mentors from industry give this hands-on learning expereince real-world expereinces and insights.
|training materials FREE by the National group and at www.micyberpatriot.com||CyberPatriot is the National Youth Cyber Education Program created by the Air Force Association to inspire K-12 students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our nation's future. At the core of the program is the National Youth Cyber Defense Competition, the nation's largest cyber defense competition that puts high school and middle school students in charge of securing virtual networks. Other programs include AFA CyberCamps, an elementary school cyber education initiative, a children’s literature series, and CyberGenerations –a cyber safety initiative geared toward keeping senior citizens safe online||https://www.uscyberpatriot.org/||Standalone||CISCO, Microsoft||self-paced, teacher/coach guided and gamification||Currently used in 53 Michigan districts|
|Elementary School Cyber Education Initiative||https://www.uscyberpatriot.org/SiteCollectionImages/Program%20Logos/CYBERPATRIOT_Education%20Program_black.png||AFA CyberPatriot||Curriculum||Cybersecurity||K-2, 3-5||Yes||PC Windows or Mac||Free||Collaborative student projects that develop students’ knowledge of ethical computing behavior. It also aims to develop students’ skills as consumers, friends, citizens, and employees who can effectively contribute to communities with a dependable cyber-infrastructure that moves and processes information safely.||Free - training inlcuded with the requested download||(ESCEI) is a set of three fun, interactive learning modules aimed at increasing grade K-6 students’ awareness of online safety and cybersecurity principles. Downloadable immediatley after filling out request form.||https://www.uscyberpatriot.org/Pages/Special%20Initiatives/Elementary-School-Initiative.aspx||English and Spanish||Standalone||NA||self-paced, teacher guided, gamification||Currently used in 14 Michigan districts|
|MICE Learning Management System||https://www.micek12.com/wp-content/uploads/2018/05/MICE-LOGO-NEW.png||MICE K12||Curriculum|
Cybersecurity, Computer Science General
|K-2, 3-5, 6-8, 9-10, 11-12, Post-Secondary||Yes||Internet, Internet Browser||$150/Student for curriculum||Student earns certifications for course completion; Covers all CTE IT Pathway Programs||Free Professional Learning||Industry Certification aligned curriculum in the following areas: IT Fundamentals, PC Repair, Computer Security, Linux Operating System, Cisco Routing & Switching, Windows Server, Ethical Hacking, Microsoft Office Specialist, Computer Science (Java, AP Computer Science A, Python), Employability Skills. Michigan CTE Program Pathway aligned and standards based. Hands-on applications and all assetments are provided.||https://www.micek12.com||Yes||Currently used in 45 Michigan districts|
|PLTW Cybersecurity||https://www.vernier.com/wp-content/uploads/2020/02/logo.project-lead-the-way._hero.001.png||Project Lead The Way||Curriculum||Cybersecurity||9-10, 11-12||Yes||PLTW Computer Specs||Starts around $5700 per class period; call for quote||Collaborative student projects that develop students’ knowledge of ethical computing behavior. It also aims to develop students’ skills as consumers, friends, citizens, and employees who can effectively contribute to communities with a dependable cyber-infrastructure that moves and processes information safely.||Professional Learning $2400||Cybersecurity introduces the tools and concepts of cybersecurity and encourages students to create solutions that allow people to share computing resources while protecting privacy.||https://www.pltw.org/our-programs/pltw-computer-science-curriculum#curriculum-4||Teacher Guided, Project-Based Delivery||Standalone|
Teacher Guided, Project-Based
|Cybersecurity in the Classroom - Empowering Educators to Teach Cyber||https://cyber.org/sites/default/files/inline-images/cyber-logo.png||NICERC/cyber.org||Curriculum||Cybersecurity||9-10, 11-12||Internet LMS||$20 per student to use Range (virtual lab)||Introduces the breadth of cybersecurity concepts and skills to students||No Cost||NICERC's/Cyber.org Cybersecurity is a comprehensive year-long course geared toward educators teaching high school cybersecurity.
With over a hundred lesson topics and dozens of activities, Cybersecurity provides the rigor and relevance expected for top quality cybersecurity education. Not only does Cybersecurity introduce the breadth of cybersecurity concepts and skills, it also prepares students to verify their technical know-how through the CompTIA Security+ (Links to an external site.) certification.
|CompTIA Sec+ Certification; CompTIA Standards Aligned||CompTIA Sec+|
On Range, or portable in-classroom
|Cybersecurity in the Classroom - Student Resources||https://niccs.us-cert.gov/profiles/niccsd8_gov/themes/custom/niccs_uswds/assets/img/logo-dark.png||NICERC/cyber.org||Resource||Cybersecurity||K-2, 3-5, 6-8, 9-10, 11-12||Browser||Free resources;||Free resources;||In addition to the curricula, Cyber.org offers education resources for out-of-the classroom settings. Activities and articles are available for students, parents, educators, and activity leaders looking to enhance students’ awareness and understanding of STEM, computer science, and cybersecurity topics.||https://niccs.us-cert.gov/formal-education/integrating-cybersecurity-classroom|
|Cyber@Home||https://cyber.org/sites/default/files/inline-images/cyber-logo.png||NICERC/cyber.org||Resource||Cybersecurity||K-2, 3-5, 6-8, 9-10, 11-13||Browser||Free dowloadable lessons; they have free webinars for teachers||Free dowloadable lessons; they have free webinars for teachers||There is something here for everyone with fun, project-based activities for elementary, middle, and high school students. Teachers may use these lessons to make assignments to their students for remote learning. Parents can download lessons for their children to explore at home.||https://nicerc.org/2020/03/nicerc-home/|
|picoCTF||https://picoctf.org/img/logos/picoctf-logo-horizontal-white.svg||Carnegie Mellon University||Resource - Game, Competition||Cybersecurity||6-8, 9-10,11-12||Website provides list of HTTP(S) whitelist||https://teachers.picoctf.com/ (professional learning); free resources||https://teachers.picoctf.com/ (professional learning); free resources||picoCTF is a free computer security game targeted at middle and high school students, created by security experts at Carnegie Mellon University. The game consists of a series of challenges centered around a unique storyline where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. There are annual competitions available as well.||https://picoctf.com/||Competition with cash prizes for top 5 teams|
Self-paced, competition based
|K12 CYBERSECURITY RESOURCES FOR AT HOME||No Logo||NIST-NICE||Resource||Cybersecurity||K-2, 3-5, 6-8, 9-10, 11-12||Browser||Free resource;||Free resource;||k-12 Cybersecurity resources for home- includes cyberawareness resources, resources for elementary, middle school and high school, cybersecurity e-books and games for kids and family. This site is a repository for multiple resources.||http://nicek12athome.weebly.com/|
|Safe Online Surfing||https://sos.fbi.gov/en/assets/imgs/ui/sos-logo-en.svg||Nova Labs||Resource||Cybersecurity||3-5, 6-8||Browser||Free resource; free teacher guide||Free resource; free teacher guide||Provides short assessments regarding online safety for upper elementary/MS students.||https://sos.fbi.gov/||Standalone||Self-paced|
|Nova Labs||https://www.pbs.org/wgbh/nova/labs/static/images/logo-nova-footer.png||PBS.org||Resource - Game||Cybersecurity||6-8, 9-10, 11-12||No||web and mobile browsers that support HTML5, including Chrome, Firefox, Safari, and Internet Explorer (version 9.0 and higher)||Free resource||free resource||The Cybersecurity Lab is a game designed to teach people how to keep their digital lives safe, spot cyber scams, learn the basics of coding, and defend against cyber attacks. Players assume the role of the chief technology officer of a start-up social network company that is the target of increasingly sophisticated cyber attacks. In the game, players must complete challenges to strengthen their cyber defenses and thwart their attackers. The Lab also features stories of real-world cyber attacks, a glossary of cyber terms, and short animated videos that explain the need for cybersecurity, privacy versus security, cryptography (cyber codes), and what exactly hackers are.||https://www.pbs.org/wgbh/nova/labs/about-cyber-lab/educator-guide/|
|Cybersecurity Guide||https://cybersecurityguide.org/wp-content/uploads/2019/10/Cybersecurity-guide-logo.png||Cybersecurity Guide||Cybersecurity Resource||Cybersecurity||K-2, 3-5, 6-8, 9-10, 11-12, post secondary||No||Browser||Free resource||Free resource||This guide serves as a guide for students interested in learning more about the cybersecurity field. We’ll also cover some tips for parents to help get their children involved in cybersecurity and teach them how to be safe will browsing online.||https://cybersecurityguide.org/resources/k-12-guide/||Informational|
|Culture of Cybersecurity||https://www.cultureofcybersecurity.com/wp-content/uploads/bb-plugin/cache/Cybear-ebook-cover-square.png||UTSA / CIAS Cyber Threat Defender||a multi-player, collectible card game||Cybersecurity||11 yrs and up||Collectable Cards||Free resource||players will learn basic cybersecurity terminology, reinforce understandings of a network infrastructure, learn about the relationships between cyber-attacks and defense counter measures, real-world challenges, facts and historical information connected to this STEM field, and much more||None-student game, no instructor needed||Approximately 20 minute card game, players to successfully defeat their opponent, they must develop and implement a strategy for expanding and protecting their network. Players will learn basic and complex cybersecurity concepts and strategies through repetitive play.||https://www.cultureofcybersecurity.com/cybear-family/||available in both English and Spanish, supports distance learning and continued engagement at home or in the classroom. It is also available as a free digital download! Click here to learn more.||None||Gamefication/learning|
|CyberAces Online||https://www.cyberaces.org/images/cyber-aces-logo-2015.png||SANS||Cybersecurity Course||Cybersecurity||9-10, 11-12, post||Yes. To fully experience the tutorial contents, you will need to install VMware (VMware Player for Windows or Linux hosts, or VMware Fusion for Macs). You'll also need to download two virtual machines to run in VMware: a Linux and a Windows version. This will require at least 30GB of disk space.||Free resource||This course develops the knowledge and skills needed to master the core concepts in cyber security. Course material is updated regularly to keep pace with changes in technology and threat landscape. Students come away with a solid foundation for building a career in cybersecurity or just strengthening their own home network.|
The course covers the three foundation areas of information security.
|None, same resources as students||SANS Cyber Aces Online is an online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorial and videos. It’s available as open courseware so you can take it anytime. SANS is donating the course from their library of professional development curriculum. And it’s free.||https://www.cyberaces.org/courses.html|
|STEMpack: Cyber Security||https://ww3.aauw.org/files/2017/12/STEMpackCyberSecurity-600x320.jpg||Symantec and AAUW||Curriculum||Cybersecurity||5-6,7-8||Internet Access and computer for every student||Free resource||Inspire and introduce participants to cyber security and computer science.||None||This curriculum is intended for a classroom setting with a computer available for each student, to be led by an experienced educator who is comfortable using technology. The robust lessons build on one another and cover the origins of the internet, binary code, an introduction to programming languages and coding, deconstructing a computer, and more. The lessons can be flexible depending on educators’ needs, but each features more than two hours of instruction and activities for computer science education for students with varying degrees of prior knowledge.||https://ww3.aauw.org/what-we-do/stem-education/stempack-cyber-security/|
|Introduction to Cybersecurity (Caesar)||https://static.codehs.com/img/brand_logo.png||CodeHS||Curriculum||Cybersecurity||6-8||Browser||Different plans ranging from Free to classroom licenses (around $2000). Contact CodeHS for more information.||Students will learn foundational cybersecurity topics and digital citizenship and cyber hygiene all through the CodeHS web-based platform. Students will complete a culminating course project where they will create a public service announcement.||Different plans ranging from Free to a cost for customized on-site PDs as well as online PD courses. Contact CodeHS for more information.||The Introduction to Cybersecurity is the first online blended K12 cybersecurity course. The Caesar semester version is designed for students with no background in computer science and there are no specific course prerequisites. This is not a coding intensive course, but rather students will learn the basics of protecting their own data and become aware of how cybersecurity is important for the information age in which we live.||https://codehs.com/course/cyber_caesar/overview||No||Teacher-Guided|
|Introduction to Cybersecurity (Alberti)||https://static.codehs.com/img/brand_logo.png||CodeHS||Curriculum||Cybersecurity||9-10, 11-12||Browser||Different plans ranging from Free to classroom licenses (around $2000). Contact CodeHS for more information.||Students will learn foundational cybersecurity topics and digital citizenship and cyber hygiene all through the CodeHS web-based platform. Students will complete a culminating course project where they will create a public service announcement.||Different plans ranging from Free to a cost for customized on-site PDs as well as online PD courses. Contact CodeHS for more information.||The Introduction to Cybersecurity is the first online blended K12 cybersecurity course. The Alberti semester version is designed for students with no background in computer science and there are no specific course prerequisites. This is not a coding intensive course, but rather students will learn the basics of protecting their own data and become aware of how cybersecurity is important for the information age in which we live.||https://codehs.com/course/cyber_alberti/lessons||No||Teacher-Guided|
|Cyber Education Training||https://www.merit.edu/wp-content/uploads/2018/03/merit_logo_tagline_NEW.svg||Merit||Resource||Cybersecurity||K-12, post||The resources include workshops, real life scenarios and hands-on training, Merit exercises, and Merit classes and certifications. There are also Cyber Range Hubs that bring schools and employers together to be part of the cybersecurity ecosystem.||https://www.merit.edu/security/training/#1590593790109-ce82d702-83a7fb71-353e|
|CyberAuto Challenge||https://www.sae.org/webfiles/1600945856871/images/sae-international-logo.png||SAE||Competition||Cybersecurity||HS, College||no||None, all equipment will be provided during the challenge||Free||. Industry professionals benefit from the fresh perspectives offered by high-performing high school and college students. Students gain exposure to industry experts and hands-on learning you can’t find anywhere else. All parties benefit from mentorship relationships and the powerful connections formed at this event.|
5 Day interactive workshop. The challenge is a series of instructor led, practical learning sessions and discussions alternating with hands-on work. It fosters collaboration and creativity amongst different cross-sectors of the automotive and cybersecurity industries.
|Girls Go CyberStart||https://girlsgocyberstart.org/assets/images/logo-ggcs-home.png||SANS||Club and Competition||Cybersecurity||HS-Girls only||PC, (Chromebook only work thru level 5), internet connection, enough memory to load VmWare||Free||Gamification learning with scenerios that build in intensity. CyberSecurity basics, Coding basics, Web securiy, Basic of Binary, concepts if Cryptography and Forensics.||None-student gamefication learning||Teams of 4 GIrls go thru Five levels of scenario based video games and the top teams then compete for the National Championship.||https://girlsgocyberstart.org/||Level One is for beginner, without any IT knowledge, you only progress to the other levels if you complete the "Misson"||On-line vidoe game/competition|
|Governor's High School Cyber Challenge||https://www.merit.edu/wp-content/uploads/2019/09/HSCC_BR_2019_OpenNow-1-copy.jpg||Merit||Competition||Cybersecurity||HS||no||Accessed through web browser or pre-installed app to a virtual desktop inside the Range/• No malware, tools or special configurations required|
• Bring Your Own Device, Can run on Chrome Books
• Low bandwidth for each client session (~720 Kbps)
|Free||1 through 10 team ranking via score board. Trophies and prizes for top 3 all round 2 participants get merit SWAG. Cerification courses are also available for those who are place and show interest. This event creates awareness and interest amongst High School youth in Cyber Careers with a fun and game like environment that engenders healthy competition.||Free||Teams comprised of up to three high school students are invited to participate in a round of challenges designed to test their knowledge of cybersecurity, computer science and information technology.|
The only requirements are an interest in cybersecurity and a familiarity with computers. This is a great cybersecurity learning opportunity for all high school students in Michigan.
All schools in Michigan are invited to participate and the challenge is entirely FREE!
|US Cyber Challenge||https://static.wixstatic.com/media/684bab_08a35dc4788c42cb8068f6b8c28f6381~mv2.jpg||SANS and Governmental agencies||Competition||Cybersecurity||HS, College||PC, Tablet, Internet connection/If you Qualify you will have to attend a Summer Camp||free||None, this is done individually by the students||Rounds of qualifing on-line tests. Qualified canidates are picked to attend Summer Camps where they receive training and compete in capture the flag contests, meet government and industry executives||https://www.uscyberchallenge.org/about||Run by SANS and Governmental agencies to find the top 10,000 students in the country||Advantaced cybersecurity and computer science knowledge needed|
|Teach Cyber||TeachCyber||Curriculum||Cybersecurity||9-10,11-12||Free||After this course, students should understand that cybersecurity has broad implications and ethical reflection and judgment are required. Students should also understand the fundamental cybersecurity principles necessary to determine security requirements and mechanisms.||This is a year-long, introductory cybersecurity course. The overarching goal of the course is to introduce students to the foundational concepts, principles, and tools of cybersecurity. The course is centered on the Cybersecurity Curriculum Guidelines and is thus situated in eight big ideas: ethics, establishing trust, ubiquitous connectivity, data security, system security, adversarial thinking, risk, and implications. (NOTE: Tentative date of complete course is December 2020.||https://teachcyber.org/|