CTE Lesson Plan on Cybersecurity
The purpose of this lesson is to learn how to determine the main ideas from digital sources. on Cybersecurity.
Students will identify the site content and information on bias.
Students will synthesize their findings from three websites, cite examples, and provide their own analysis in a 5-minute speech.
Cybersecurity, Web Searches and Bias
Lesson Plan Template from: Moreillon, Judi. Coteaching Reading Comprehension Strategies in Secondary School Libraries: Maximizing Your Impact. Chicago: ALA Editions, 2012.
1 60-minute class session
The purpose of this lesson is to learn how to determine the main ideas from digital sources. Students will identify the site content and information on bias. Students will synthesize their findings from three websites, cite examples, and provide their own analysis in a 5-minute speech.
By the end of this lesson, students will be able to:
Resources, Materials, and Equipment
Student Laptops, Data Projector
Teacher and Library/Media Specialist model recording data related to site content and bias. Educators monitor student guided practice as they record data and analyze three sites while composing a 5-minute speech.
Standards (from the MI or other state standards)
Computer Systems Networking and Telecommunications Consolidated Standards (2011)M Recognize and analyze potential IT security threats to develop and maintain security requirements.
Reading and/or Writing
CC.9-10.R.I.7 Integration of Knowledge and Ideas: Analyze various accounts of a subject told in different mediums (e.g., a person’s life story in both print and multimedia), determining which details are emphasized in each account.
CC.9-10.W.9 Research to Build and Present Knowledge: Draw evidence from literary or informational texts to support analysis, reflection, and research.
Listening and Speaking
CC.9-10.SL.2 Comprehension and Collaboration: Integrate multiple sources of information presented in diverse media or formats (e.g., visually, quantitatively, orally) evaluating the credibility and accuracy of each source.
AASL Shared Foundation
Shared Foundation: INQUIRE, think critically, and gain knowledge.
1.1 Domain/Competency: THINK
1.1.5 Evaluate information found in selected sources on the basis of accuracy, validity, appropriateness to needs, importance, and social and cultural context.
1.1.6 Read, view, and listen for information presented in any format (e.g., textual, visual, media, digital) in order to make inferences and gather meaning.
Shared Foundation: CURATE, draw conclusions, make informed decisions, apply knowledge to new situations, and create new knowledge.
2.1 Domain/Competency: THINK
2.1.2 Organize knowledge so that it is useful.
Show the “Cybersecurity 101” video (3:52) to students and have them discuss ideas about cybersecurity. Talk about privilege by working in Cybersecurity field and the importance of the work.
Distribute Advance Organizer. Explain what to look for to complete the organizer.
Educators model with the website and complete Advance Organizer:https://www.cnbc.com/2019/07/17/ai-has-a-bias-problem-that-can-be-a-big-challenge-in-cybersecurity.html
Educators model how to cite a website as a source.
Show students the list of 20 Cybersecurity Websites, with groups reviewing different websites.
Distribute Rubric for 5-Minute Speech. Explain what to complete, including a citation for sources. (Refer back to model.)
Give students time to work using their laptops. Teacher and Library/Media Specialist monitor students as they work, providing further instruction, as needed.
Student Participation or Practice Procedures
Educators monitor student data collection, completeness of the Advance Organizer, and work on 5-minute speech.
Educators facilitate student sharing of their 5-minute speeches. Student self-evaluates using the rubric.
Educators discussion with students: What did you learn about Cybersecurity? What did you learn about bias and Cybersecurity? What did you learn about the main ideas on websites?
Educators could explore extension ideas: having a guest speaker on cybersecurity, providing a real example of cybersecurity and letting students work on solutions, and emphasizing the privilege and responsibility that comes with this knowledge and expertise.