ABCDEFGHIJKLMNOPQRSTUVWXYZAAABACADAEAF
1
TitleLogoPublisherType of ResourceFocus AreaGrade BandStandards AlignEquipment NecessaryStudent Learning CostOutcomesProfessional Learning CostDescriptionWebsite Link
Additional InfoExperience Level Needed (For Teachers)Curriculum - Integration into Core CurriculumCertification TrackDelivery ModelRecommendations from Schools
2
FilterFilterFilterFilter (Yes, No)
3
AFA National CyberPatriothttps://www.uscyberpatriot.org/SiteCollectionImages/Program%20Logos/CYBERPATRIOT_Education%20Program_black.pngAFA CyberPatriotCompetitionCybersecurity6-8, 9-10, 11-12Yes and NICE Workforce Framework: see www.badgr.comPC Windows or Mac (Competition only on PC 64 bit with enough disc space for VmWare)$205 High School Team, $165 Middle School Team Increase knowledge of Cybersec as an Education and Career Pathway, 89% increase in pursuit of a 2yr or 4yr degree with 74% of those student going into a STEM field,alumni of the CyberPatroit program in college 84% are in STEM fields, 85% of students going into STEM stated that being in CyberPatriot was the reason they chose those field, all these stats come from the 2020 CP Annual Reprot done by National Center for Education Statistics. (2020, April). Immediate College Enrollment Rates. Retrieved from
https://nces.ed.gov/programs/coe/indicator_cpa.asp Other outcomes: basic computer security principles, Microsoft OS security, Linux OS security, CISCO networking security, promotes leadership, promotes working in teams on difficult security issues, promotes ethical practices in defense of our nation's infrastructure, promotes diversity and inclusion, our Mentors from industry give this hands-on learning expereince real-world expereinces and insights.
training materials FREE by the National group and at www.micyberpatriot.comCyberPatriot is the National Youth Cyber Education Program created by the Air Force Association to inspire K-12 students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our nation's future. ​At the core of the program is the National Youth Cyber Defense Competition, the nation's largest cyber defense competition that puts high school and middle school students in charge of securing virtual networks. Other programs include AFA CyberCamps, an elementary school cyber education initiative, a children’s literature series, and CyberGenerations –a cyber safety initiative geared toward keeping senior citizens safe onlinehttps://www.uscyberpatriot.org/StandaloneCISCO, Microsoftself-paced, teacher/coach guided and gamificationCurrently used in 53 Michigan districts
4
Elementary School Cyber Education Initiativehttps://www.uscyberpatriot.org/SiteCollectionImages/Program%20Logos/CYBERPATRIOT_Education%20Program_black.pngAFA CyberPatriotCurriculumCybersecurityK-2, 3-5YesPC Windows or MacFreeCollaborative student projects that develop students’ knowledge of ethical computing behavior. It also aims to develop students’ skills as consumers, friends, citizens, and employees who can effectively contribute to communities with a dependable cyber-infrastructure that moves and processes information safely. Free - training inlcuded with the requested download(ESCEI) is a set of three fun, interactive learning modules aimed at increasing grade K-6 students’ awareness of online safety and cyber​security principles. Downloadable immediatley after filling out request form.https://www.uscyberpatriot.org/Pages/Special%20Initiatives/Elementary-School-Initiative.aspxEnglish and SpanishStandaloneNAself-paced, teacher guided, gamificationCurrently used in 14 Michigan districts
5
MICE Learning Management Systemhttps://www.micek12.com/wp-content/uploads/2018/05/MICE-LOGO-NEW.pngMICE K12Curriculum
Cybersecurity, Computer Science General
K-2, 3-5, 6-8, 9-10, 11-12, Post-SecondaryYesInternet, Internet Browser$150/Student for curriculumStudent earns certifications for course completion; Covers all CTE IT Pathway ProgramsFree Professional LearningIndustry Certification aligned curriculum in the following areas: IT Fundamentals, PC Repair, Computer Security, Linux Operating System, Cisco Routing & Switching, Windows Server, Ethical Hacking, Microsoft Office Specialist, Computer Science (Java, AP Computer Science A, Python), Employability Skills. Michigan CTE Program Pathway aligned and standards based. Hands-on applications and all assetments are provided.https://www.micek12.comYesCurrently used in 45 Michigan districts
6
PLTW Cybersecurityhttps://www.vernier.com/wp-content/uploads/2020/02/logo.project-lead-the-way._hero.001.pngProject Lead The WayCurriculumCybersecurity9-10, 11-12YesPLTW Computer SpecsStarts around $5700 per class period; call for quoteCollaborative student projects that develop students’ knowledge of ethical computing behavior. It also aims to develop students’ skills as consumers, friends, citizens, and employees who can effectively contribute to communities with a dependable cyber-infrastructure that moves and processes information safely. Professional Learning $2400Cybersecurity introduces the tools and concepts of cybersecurity and encourages students to create solutions that allow people to share computing resources while protecting privacy. https://www.pltw.org/our-programs/pltw-computer-science-curriculum#curriculum-4Teacher Guided, Project-Based DeliveryStandalone
Teacher Guided, Project-Based
7
Cybersecurity in the Classroom - Empowering Educators to Teach Cyberhttps://cyber.org/sites/default/files/inline-images/cyber-logo.pngNICERC/cyber.orgCurriculumCybersecurity9-10, 11-12Internet LMS$20 per student to use Range (virtual lab)Introduces the breadth of cybersecurity concepts and skills to studentsNo CostNICERC's/Cyber.org Cybersecurity is a comprehensive year-long course geared toward educators teaching high school cybersecurity.

With over a hundred lesson topics and dozens of activities, Cybersecurity provides the rigor and relevance expected for top quality cybersecurity education. Not only does Cybersecurity introduce the breadth of cybersecurity concepts and skills, it also prepares students to verify their technical know-how through the CompTIA Security+ (Links to an external site.) certification.
https://cyber.org/find-curricula
CompTIA Sec+ Certification; CompTIA Standards AlignedCompTIA Sec+
On Range, or portable in-classroom
8
Cybersecurity in the Classroom - Student Resourceshttps://niccs.us-cert.gov/profiles/niccsd8_gov/themes/custom/niccs_uswds/assets/img/logo-dark.pngNICERC/cyber.orgResourceCybersecurityK-2, 3-5, 6-8, 9-10, 11-12BrowserFree resources;Free resources;In addition to the curricula, Cyber.org offers education resources for out-of-the classroom settings. Activities and articles are available for students, parents, educators, and activity leaders looking to enhance students’ awareness and understanding of STEM, computer science, and cybersecurity topics.https://niccs.us-cert.gov/formal-education/integrating-cybersecurity-classroom
9
Cyber@Homehttps://cyber.org/sites/default/files/inline-images/cyber-logo.pngNICERC/cyber.orgResourceCybersecurityK-2, 3-5, 6-8, 9-10, 11-13BrowserFree dowloadable lessons; they have free webinars for teachersFree dowloadable lessons; they have free webinars for teachersThere is something here for everyone with fun, project-based activities for elementary, middle, and high school students. Teachers may use these lessons to make assignments to their students for remote learning. Parents can download lessons for their children to explore at home. https://nicerc.org/2020/03/nicerc-home/
10
picoCTFhttps://picoctf.org/img/logos/picoctf-logo-horizontal-white.svgCarnegie Mellon UniversityResource - Game, CompetitionCybersecurity6-8, 9-10,11-12Website provides list of HTTP(S) whitelisthttps://teachers.picoctf.com/ (professional learning); free resourceshttps://teachers.picoctf.com/ (professional learning); free resourcespicoCTF is a free computer security game targeted at middle and high school students, created by security experts at Carnegie Mellon University. The game consists of a series of challenges centered around a unique storyline where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. There are annual competitions available as well.https://picoctf.com/Competition with cash prizes for top 5 teams
Self-paced, competition based
11
K12 CYBERSECURITY RESOURCES FOR AT HOMENo LogoNIST-NICEResourceCybersecurityK-2, 3-5, 6-8, 9-10, 11-12BrowserFree resource; Free resource; k-12 Cybersecurity resources for home- includes cyberawareness resources, resources for elementary, middle school and high school, cybersecurity e-books and games for kids and family. This site is a repository for multiple resources.http://nicek12athome.weebly.com/
12
Safe Online Surfinghttps://sos.fbi.gov/en/assets/imgs/ui/sos-logo-en.svgNova LabsResourceCybersecurity3-5, 6-8BrowserFree resource; free teacher guideFree resource; free teacher guideProvides short assessments regarding online safety for upper elementary/MS students.https://sos.fbi.gov/StandaloneSelf-paced
13
Nova Labshttps://www.pbs.org/wgbh/nova/labs/static/images/logo-nova-footer.pngPBS.orgResource - GameCybersecurity6-8, 9-10, 11-12Noweb and mobile browsers that support HTML5, including Chrome, Firefox, Safari, and Internet Explorer (version 9.0 and higher)Free resourcefree resourceThe Cybersecurity Lab is a game designed to teach people how to keep their digital lives safe, spot cyber scams, learn the basics of coding, and defend against cyber attacks. Players assume the role of the chief technology officer of a start-up social network company that is the target of increasingly sophisticated cyber attacks. In the game, players must complete challenges to strengthen their cyber defenses and thwart their attackers. The Lab also features stories of real-world cyber attacks, a glossary of cyber terms, and short animated videos that explain the need for cybersecurity, privacy versus security, cryptography (cyber codes), and what exactly hackers are.https://www.pbs.org/wgbh/nova/labs/about-cyber-lab/educator-guide/
14
Cybersecurity Guidehttps://cybersecurityguide.org/wp-content/uploads/2019/10/Cybersecurity-guide-logo.pngCybersecurity GuideCybersecurity ResourceCybersecurityK-2, 3-5, 6-8, 9-10, 11-12, post secondaryNoBrowserFree resourceFree resourceThis guide serves as a guide for students interested in learning more about the cybersecurity field. We’ll also cover some tips for parents to help get their children involved in cybersecurity and teach them how to be safe will browsing online.https://cybersecurityguide.org/resources/k-12-guide/Informational
15
Culture of Cybersecurityhttps://www.cultureofcybersecurity.com/wp-content/uploads/bb-plugin/cache/Cybear-ebook-cover-square.pngUTSA / CIAS Cyber Threat Defender a multi-player, collectible card gameCybersecurity11 yrs and upCollectable CardsFree resourceplayers will learn basic cybersecurity terminology, reinforce understandings of a network infrastructure, learn about the relationships between cyber-attacks and defense counter measures, real-world challenges, facts and historical information connected to this STEM field, and much moreNone-student game, no instructor neededApproximately 20 minute card game, players to successfully defeat their opponent, they must develop and implement a strategy for expanding and protecting their network. Players will learn basic and complex cybersecurity concepts and strategies through repetitive play.https://www.cultureofcybersecurity.com/cybear-family/available in both English and Spanish, supports distance learning and continued engagement at home or in the classroom. It is also available as a free digital download! Click here to learn more.NoneGamefication/learning
16
CyberAces Onlinehttps://www.cyberaces.org/images/cyber-aces-logo-2015.pngSANSCybersecurity CourseCybersecurity9-10, 11-12, postYes. To fully experience the tutorial contents, you will need to install VMware (VMware Player for Windows or Linux hosts, or VMware Fusion for Macs). You'll also need to download two virtual machines to run in VMware: a Linux and a Windows version. This will require at least 30GB of disk space.

Free resourceThis course develops the knowledge and skills needed to master the core concepts in cyber security. Course material is updated regularly to keep pace with changes in technology and threat landscape. Students come away with a solid foundation for building a career in cybersecurity or just strengthening their own home network.

The course covers the three foundation areas of information security.

Operating Systems
Networking
Systems Administration
None, same resources as studentsSANS Cyber Aces Online is an online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorial and videos. It’s available as open courseware so you can take it anytime. SANS is donating the course from their library of professional development curriculum. And it’s free.https://www.cyberaces.org/courses.html
17
STEMpack: Cyber Securityhttps://ww3.aauw.org/files/2017/12/STEMpackCyberSecurity-600x320.jpgSymantec and AAUWCurriculumCybersecurity5-6,7-8Internet Access and computer for every studentFree resourceInspire and introduce participants to cyber security and computer science.NoneThis curriculum is intended for a classroom setting with a computer available for each student, to be led by an experienced educator who is comfortable using technology. The robust lessons build on one another and cover the origins of the internet, binary code, an introduction to programming languages and coding, deconstructing a computer, and more. The lessons can be flexible depending on educators’ needs, but each features more than two hours of instruction and activities for computer science education for students with varying degrees of prior knowledge.https://ww3.aauw.org/what-we-do/stem-education/stempack-cyber-security/
18
Introduction to Cybersecurity (Vigenere)https://static.codehs.com/img/brand_logo.pngCodeHSCurriculumCybersecurity9-10, 11-12BrowserDifferent plans ranging from Free to classroom licenses (around $2000). Contact CodeHS for more information.Students will learn foundational cybersecurity topics including digital citizenship and cyber hygiene, the basics of cryptography, software security, networking fundamentals, and basic system administration and all through the CodeHS web-based platform. Students will complete projects at the end of each module, and a culminating course project where they will complete a simulated hack walkthrough. Different plans ranging from Free to a cost for customized on-site PDs as well as online PD courses. Contact CodeHS for more information.The Introduction to Cybersecurity is the first online blended K12 cybersecurity course. The Vigenère year-long version is designed for students with some exposure to computer science, but there are no specific course prerequisites. This is not a coding intensive course, but students will learn basic SQL, and will utilize basic HTML and JavaScript within specific contexts and will be provided supports within those contexts.
https://codehs.com/course/purchase/3433NoTeacher-Guided
19
Introduction to Cybersecurity (Caesar)https://static.codehs.com/img/brand_logo.pngCodeHSCurriculumCybersecurity6-8BrowserDifferent plans ranging from Free to classroom licenses (around $2000). Contact CodeHS for more information.Students will learn foundational cybersecurity topics and digital citizenship and cyber hygiene all through the CodeHS web-based platform. Students will complete a culminating course project where they will create a public service announcement. Different plans ranging from Free to a cost for customized on-site PDs as well as online PD courses. Contact CodeHS for more information.The Introduction to Cybersecurity is the first online blended K12 cybersecurity course. The Caesar semester version is designed for students with no background in computer science and there are no specific course prerequisites. This is not a coding intensive course, but rather students will learn the basics of protecting their own data and become aware of how cybersecurity is important for the information age in which we live.https://codehs.com/course/cyber_caesar/overviewNoTeacher-Guided
20
Introduction to Cybersecurity (Alberti)https://static.codehs.com/img/brand_logo.pngCodeHSCurriculumCybersecurity9-10, 11-12BrowserDifferent plans ranging from Free to classroom licenses (around $2000). Contact CodeHS for more information.Students will learn foundational cybersecurity topics and digital citizenship and cyber hygiene all through the CodeHS web-based platform. Students will complete a culminating course project where they will create a public service announcement.Different plans ranging from Free to a cost for customized on-site PDs as well as online PD courses. Contact CodeHS for more information.The Introduction to Cybersecurity is the first online blended K12 cybersecurity course. The Alberti semester version is designed for students with no background in computer science and there are no specific course prerequisites. This is not a coding intensive course, but rather students will learn the basics of protecting their own data and become aware of how cybersecurity is important for the information age in which we live.https://codehs.com/course/cyber_alberti/lessonsNoTeacher-Guided
21
Cyber Education Traininghttps://www.merit.edu/wp-content/uploads/2018/03/merit_logo_tagline_NEW.svgMeritResourceCybersecurityK-12, postThe resources include workshops, real life scenarios and hands-on training, Merit exercises, and Merit classes and certifications. There are also Cyber Range Hubs that bring schools and employers together to be part of the cybersecurity ecosystem.https://www.merit.edu/security/training/#1590593790109-ce82d702-83a7fb71-353e
22
CyberAuto Challengehttps://www.sae.org/webfiles/1600945856871/images/sae-international-logo.pngSAECompetitionCybersecurityHS, CollegenoNone, all equipment will be provided during the challengeFree. Industry professionals benefit from the fresh perspectives offered by high-performing high school and college students. Students gain exposure to industry experts and hands-on learning you can’t find anywhere else. All parties benefit from mentorship relationships and the powerful connections formed at this event.
5 Day interactive workshop. The challenge is a series of instructor led, practical learning sessions and discussions alternating with hands-on work. It fosters collaboration and creativity amongst different cross-sectors of the automotive and cybersecurity industries.
https://www.sae.org/attend/cyberauto
23
Girls Go CyberStarthttps://girlsgocyberstart.org/assets/images/logo-ggcs-home.pngSANSClub and CompetitionCybersecurityHS-Girls onlyPC, (Chromebook only work thru level 5), internet connection, enough memory to load VmWareFreeGamification learning with scenerios that build in intensity. CyberSecurity basics, Coding basics, Web securiy, Basic of Binary, concepts if Cryptography and Forensics.None-student gamefication learningTeams of 4 GIrls go thru Five levels of scenario based video games and the top teams then compete for the National Championship. https://girlsgocyberstart.org/Level One is for beginner, without any IT knowledge, you only progress to the other levels if you complete the "Misson"On-line vidoe game/competition
24
Governor's High School Cyber Challengehttps://www.merit.edu/wp-content/uploads/2019/09/HSCC_BR_2019_OpenNow-1-copy.jpgMeritCompetitionCybersecurityHSnoAccessed through web browser or pre-installed app to a virtual desktop inside the Range/• No malware, tools or special configurations required
• Bring Your Own Device, Can run on Chrome Books
• Low bandwidth for each client session (~720 Kbps)
Free1 through 10 team ranking via score board. Trophies and prizes for top 3 all round 2 participants get merit SWAG. Cerification courses are also available for those who are place and show interest. This event creates awareness and interest amongst High School youth in Cyber Careers with a fun and game like environment that engenders healthy competition.FreeTeams comprised of up to three high school students are invited to participate in a round of challenges designed to test their knowledge of cybersecurity, computer science and information technology.

The only requirements are an interest in cybersecurity and a familiarity with computers. This is a great cybersecurity learning opportunity for all high school students in Michigan.

All schools in Michigan are invited to participate and the challenge is entirely FREE!
https://www.merit.edu/community/events/cyberchallenge/Virtual
25
US Cyber Challengehttps://static.wixstatic.com/media/684bab_08a35dc4788c42cb8068f6b8c28f6381~mv2.jpgSANS and Governmental agenciesCompetitionCybersecurityHS, CollegePC, Tablet, Internet connection/If you Qualify you will have to attend a Summer CampfreeNone, this is done individually by the studentsRounds of qualifing on-line tests. Qualified canidates are picked to attend Summer Camps where they receive training and compete in capture the flag contests, meet government and industry executiveshttps://www.uscyberchallenge.org/aboutRun by SANS and Governmental agencies to find the top 10,000 students in the countryAdvantaced cybersecurity and computer science knowledge needed
26
Teach CyberTeachCyberCurriculumCybersecurity9-10,11-12FreeAfter this course, students should understand that cybersecurity has broad implications and ethical reflection and judgment are required. Students should also understand the fundamental cybersecurity principles necessary to determine security requirements and mechanisms. This is a year-long, introductory cybersecurity course. The overarching goal of the course is to introduce students to the foundational concepts, principles, and tools of cybersecurity. The course is centered on the Cybersecurity Curriculum Guidelines and is thus situated in eight big ideas: ethics, establishing trust, ubiquitous connectivity, data security, system security, adversarial thinking, risk, and implications. (NOTE: Tentative date of complete course is December 2020.https://teachcyber.org/
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100